Analysis

Category Package Started Completed Duration Options Log
FILE exe 2020-03-24 10:13:06 2020-03-24 10:17:18 252 seconds Show Options Show Log
route = internet
procdump = 1
2020-03-24 10:13:10,015 [root] INFO: Date set to: 03-24-20, time set to: 10:13:10, timeout set to: 200
2020-03-24 10:13:10,670 [root] DEBUG: Starting analyzer from: C:\edjcn
2020-03-24 10:13:10,670 [root] DEBUG: Storing results at: C:\MUEEHTh
2020-03-24 10:13:10,670 [root] DEBUG: Pipe server name: \\.\PIPE\rVaCts
2020-03-24 10:13:10,670 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-03-24 10:13:10,670 [root] INFO: Automatically selected analysis package "exe"
2020-03-24 10:13:21,388 [root] DEBUG: Started auxiliary module Browser
2020-03-24 10:13:21,388 [root] DEBUG: Started auxiliary module Curtain
2020-03-24 10:13:21,388 [modules.auxiliary.digisig] DEBUG: Checking for a digitial signature.
2020-03-24 10:13:28,002 [modules.auxiliary.digisig] DEBUG: File is not signed.
2020-03-24 10:13:28,002 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2020-03-24 10:13:28,002 [root] DEBUG: Started auxiliary module DigiSig
2020-03-24 10:13:28,017 [root] DEBUG: Started auxiliary module Disguise
2020-03-24 10:13:28,017 [root] DEBUG: Started auxiliary module Human
2020-03-24 10:13:28,017 [root] DEBUG: Started auxiliary module Screenshots
2020-03-24 10:13:28,017 [root] DEBUG: Started auxiliary module Sysmon
2020-03-24 10:13:28,017 [root] DEBUG: Started auxiliary module Usage
2020-03-24 10:13:28,017 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option
2020-03-24 10:13:28,017 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option
2020-03-24 10:13:28,141 [lib.api.process] INFO: Successfully executed process from path "C:\Users\user\AppData\Local\Temp\LHL6gxb1Om7mn2m.exe" with arguments "" with pid 1844
2020-03-24 10:13:28,141 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:28,141 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:28,188 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:28,188 [root] DEBUG: Loader: Injecting process 1844 (thread 2996) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:28,188 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:28,188 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:28,188 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:28,204 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:28,204 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1844
2020-03-24 10:13:30,325 [lib.api.process] INFO: Successfully resumed process with pid 1844
2020-03-24 10:13:31,200 [root] INFO: Added new process to list with pid: 1844
2020-03-24 10:13:31,200 [root] DEBUG: Terminate processes on terminate_event enabled.
2020-03-24 10:13:31,230 [root] DEBUG: Process dumps enabled.
2020-03-24 10:13:31,684 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:31,684 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:31,684 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:31,684 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-03-24 10:13:31,684 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:31,684 [root] DEBUG: CAPE initialised: 32-bit base package loaded in process 1844 at 0x74af0000, image base 0x400000, stack from 0x186000-0x190000
2020-03-24 10:13:31,698 [root] DEBUG: Commandline: C:\Users\user\AppData\Local\Temp\"C:\Users\user\AppData\Local\Temp\LHL6gxb1Om7mn2m.exe".
2020-03-24 10:13:31,698 [root] INFO: Monitor successfully loaded in process with pid 1844.
2020-03-24 10:13:32,604 [root] DEBUG: DLL loaded at 0x74800000: C:\Windows\system32\SXS (0x5f000 bytes).
2020-03-24 10:13:36,378 [root] DEBUG: DLL loaded at 0x747E0000: C:\Windows\system32\VERSION (0x9000 bytes).
2020-03-24 10:13:36,378 [root] DEBUG: DLL unloaded from 0x00400000.
2020-03-24 10:13:41,605 [root] DEBUG: set_caller_info: Adding region at 0x003F0000 to caller regions list (ntdll::LdrLoadDll).
2020-03-24 10:13:41,683 [root] DEBUG: DLL loaded at 0x75B20000: C:\Windows\syswow64\shell32 (0xc4a000 bytes).
2020-03-24 10:13:41,746 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2028
2020-03-24 10:13:41,746 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,746 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,760 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,760 [root] DEBUG: Loader: Injecting process 2028 (thread 892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,760 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,760 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,760 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,760 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,760 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2028
2020-03-24 10:13:41,760 [root] DEBUG: DLL loaded at 0x74CB0000: C:\Windows\system32\apphelp (0x4c000 bytes).
2020-03-24 10:13:41,776 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2028
2020-03-24 10:13:41,776 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,776 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,776 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,776 [root] DEBUG: Loader: Injecting process 2028 (thread 892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,776 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,776 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,776 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,776 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,776 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2028
2020-03-24 10:13:41,823 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1016
2020-03-24 10:13:41,823 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,823 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,823 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,823 [root] DEBUG: Loader: Injecting process 1016 (thread 3036) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,823 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,823 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,823 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,823 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,823 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1016
2020-03-24 10:13:41,838 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1016
2020-03-24 10:13:41,838 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,838 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,838 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,838 [root] DEBUG: Loader: Injecting process 1016 (thread 3036) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,838 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,838 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,838 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,838 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,838 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1016
2020-03-24 10:13:41,855 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1656
2020-03-24 10:13:41,855 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,855 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,855 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,855 [root] DEBUG: Loader: Injecting process 1656 (thread 2944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,855 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,855 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,855 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,855 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,855 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1656
2020-03-24 10:13:41,869 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1656
2020-03-24 10:13:41,869 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,869 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,869 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,869 [root] DEBUG: Loader: Injecting process 1656 (thread 2944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,869 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,869 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,869 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,869 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,869 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1656
2020-03-24 10:13:41,901 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2572
2020-03-24 10:13:41,901 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,901 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,901 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,901 [root] DEBUG: Loader: Injecting process 2572 (thread 2956) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,901 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,901 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,901 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,901 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,901 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2572
2020-03-24 10:13:41,917 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2572
2020-03-24 10:13:41,917 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,917 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,917 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,917 [root] DEBUG: Loader: Injecting process 2572 (thread 2956) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,917 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,917 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,917 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,917 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2572
2020-03-24 10:13:41,933 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1940
2020-03-24 10:13:41,933 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,933 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,933 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,933 [root] DEBUG: Loader: Injecting process 1940 (thread 1884) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,933 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,933 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,933 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,933 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,933 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1940
2020-03-24 10:13:41,947 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1940
2020-03-24 10:13:41,947 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,947 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,947 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,947 [root] DEBUG: Loader: Injecting process 1940 (thread 1884) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,947 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,947 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,947 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,947 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,947 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1940
2020-03-24 10:13:41,963 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2588
2020-03-24 10:13:41,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,963 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,963 [root] DEBUG: Loader: Injecting process 2588 (thread 2352) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,963 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,963 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,963 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,963 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,963 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-03-24 10:13:41,980 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2588
2020-03-24 10:13:41,980 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,980 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,980 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,980 [root] DEBUG: Loader: Injecting process 2588 (thread 2352) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,980 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,980 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,980 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,980 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,980 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-03-24 10:13:41,994 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2660
2020-03-24 10:13:41,994 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,994 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:41,994 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:41,994 [root] DEBUG: Loader: Injecting process 2660 (thread 2840) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,994 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,994 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,994 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,994 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:41,994 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2660
2020-03-24 10:13:42,010 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2660
2020-03-24 10:13:42,010 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,010 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,010 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,010 [root] DEBUG: Loader: Injecting process 2660 (thread 2840) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,010 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,010 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,010 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,010 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,010 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2660
2020-03-24 10:13:42,026 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2748
2020-03-24 10:13:42,026 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,026 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,026 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,026 [root] DEBUG: Loader: Injecting process 2748 (thread 2744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,026 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,026 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,026 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,026 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,026 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2748
2020-03-24 10:13:42,042 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2748
2020-03-24 10:13:42,042 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,042 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,042 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,042 [root] DEBUG: Loader: Injecting process 2748 (thread 2744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,042 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,042 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,042 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2748
2020-03-24 10:13:42,058 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2356
2020-03-24 10:13:42,058 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,058 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,058 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,058 [root] DEBUG: Loader: Injecting process 2356 (thread 2336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,058 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,058 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,058 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,058 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,058 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2356
2020-03-24 10:13:42,072 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2356
2020-03-24 10:13:42,072 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,072 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,072 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,072 [root] DEBUG: Loader: Injecting process 2356 (thread 2336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,072 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,072 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,072 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,072 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,072 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2356
2020-03-24 10:13:42,088 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2704
2020-03-24 10:13:42,088 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,088 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,088 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,088 [root] DEBUG: Loader: Injecting process 2704 (thread 2120) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,088 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,088 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,088 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,088 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,088 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2704
2020-03-24 10:13:42,104 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2704
2020-03-24 10:13:42,104 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,104 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,104 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,104 [root] DEBUG: Loader: Injecting process 2704 (thread 2120) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,104 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,104 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,104 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,104 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,104 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2704
2020-03-24 10:13:42,119 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2292
2020-03-24 10:13:42,119 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,119 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,119 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,119 [root] DEBUG: Loader: Injecting process 2292 (thread 2324) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,119 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,119 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,119 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,119 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,119 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2292
2020-03-24 10:13:42,135 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2292
2020-03-24 10:13:42,135 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,135 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,135 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,135 [root] DEBUG: Loader: Injecting process 2292 (thread 2324) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,135 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,135 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,135 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,135 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,135 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2292
2020-03-24 10:13:42,151 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2480
2020-03-24 10:13:42,151 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,151 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,151 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,151 [root] DEBUG: Loader: Injecting process 2480 (thread 2792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,151 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,151 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,151 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,151 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,151 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2480
2020-03-24 10:13:42,167 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2480
2020-03-24 10:13:42,167 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,167 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,167 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,167 [root] DEBUG: Loader: Injecting process 2480 (thread 2792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,167 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,167 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,167 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,167 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,167 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2480
2020-03-24 10:13:42,181 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2544
2020-03-24 10:13:42,181 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,181 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,181 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,181 [root] DEBUG: Loader: Injecting process 2544 (thread 880) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,181 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,181 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,181 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,181 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,181 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2544
2020-03-24 10:13:42,197 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2544
2020-03-24 10:13:42,197 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,197 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,197 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,197 [root] DEBUG: Loader: Injecting process 2544 (thread 880) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,197 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,197 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,197 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,197 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,197 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2544
2020-03-24 10:13:42,213 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2208
2020-03-24 10:13:42,213 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,213 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,213 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,213 [root] DEBUG: Loader: Injecting process 2208 (thread 1408) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,213 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,213 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,213 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,213 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,213 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2208
2020-03-24 10:13:42,229 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2208
2020-03-24 10:13:42,229 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,229 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,229 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,229 [root] DEBUG: Loader: Injecting process 2208 (thread 1408) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,229 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,229 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,229 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,229 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,229 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2208
2020-03-24 10:13:42,244 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 420
2020-03-24 10:13:42,244 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,244 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,244 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,244 [root] DEBUG: Loader: Injecting process 420 (thread 888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,244 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,244 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,244 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,244 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,244 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 420
2020-03-24 10:13:42,259 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 420
2020-03-24 10:13:42,259 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,259 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,259 [root] DEBUG: Loader: Injecting process 420 (thread 888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,259 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,259 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 420
2020-03-24 10:13:42,276 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2960
2020-03-24 10:13:42,276 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,276 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,276 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,276 [root] DEBUG: Loader: Injecting process 2960 (thread 2876) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,276 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,276 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,276 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,276 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,276 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2960
2020-03-24 10:13:42,292 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2960
2020-03-24 10:13:42,292 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,292 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,292 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,292 [root] DEBUG: Loader: Injecting process 2960 (thread 2876) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,292 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,292 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,292 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,292 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,292 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2960
2020-03-24 10:13:42,306 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1084
2020-03-24 10:13:42,306 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,306 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,306 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,306 [root] DEBUG: Loader: Injecting process 1084 (thread 2272) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,306 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,306 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,306 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,306 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,306 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1084
2020-03-24 10:13:42,322 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1084
2020-03-24 10:13:42,322 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,322 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,322 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,322 [root] DEBUG: Loader: Injecting process 1084 (thread 2272) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,322 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,322 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,322 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,322 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,322 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1084
2020-03-24 10:13:42,338 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2420
2020-03-24 10:13:42,338 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,338 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,338 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,338 [root] DEBUG: Loader: Injecting process 2420 (thread 2868) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,338 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,338 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,338 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,338 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,338 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2420
2020-03-24 10:13:42,354 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2420
2020-03-24 10:13:42,354 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,354 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,354 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,354 [root] DEBUG: Loader: Injecting process 2420 (thread 2868) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,354 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,354 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,354 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,354 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,354 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2420
2020-03-24 10:13:42,369 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2676
2020-03-24 10:13:42,369 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,369 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,369 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,369 [root] DEBUG: Loader: Injecting process 2676 (thread 2780) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,369 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,369 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,369 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,369 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,369 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2676
2020-03-24 10:13:42,384 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2676
2020-03-24 10:13:42,384 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,384 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,384 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,384 [root] DEBUG: Loader: Injecting process 2676 (thread 2780) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,384 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,384 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,384 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,384 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,384 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2676
2020-03-24 10:13:42,401 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2828
2020-03-24 10:13:42,401 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,401 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,401 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,401 [root] DEBUG: Loader: Injecting process 2828 (thread 592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,401 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,401 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,401 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,401 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,401 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2828
2020-03-24 10:13:42,415 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2828
2020-03-24 10:13:42,415 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,415 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,415 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,415 [root] DEBUG: Loader: Injecting process 2828 (thread 592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,415 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,415 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,415 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,415 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,415 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2828
2020-03-24 10:13:42,431 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2716
2020-03-24 10:13:42,431 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,431 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,431 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,431 [root] DEBUG: Loader: Injecting process 2716 (thread 1696) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,431 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,431 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,431 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,431 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,431 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2716
2020-03-24 10:13:42,447 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2716
2020-03-24 10:13:42,447 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,447 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,447 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,447 [root] DEBUG: Loader: Injecting process 2716 (thread 1696) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,447 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,447 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,447 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,447 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,447 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2716
2020-03-24 10:13:42,463 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2632
2020-03-24 10:13:42,463 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,463 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,463 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,463 [root] DEBUG: Loader: Injecting process 2632 (thread 2836) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,463 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,463 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,463 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,463 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,463 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2632
2020-03-24 10:13:42,479 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2632
2020-03-24 10:13:42,479 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,479 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,479 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,479 [root] DEBUG: Loader: Injecting process 2632 (thread 2836) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,479 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,479 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,479 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,479 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,479 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2632
2020-03-24 10:13:42,493 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 872
2020-03-24 10:13:42,493 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,493 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,493 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,493 [root] DEBUG: Loader: Injecting process 872 (thread 1052) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,493 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,493 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,493 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 872
2020-03-24 10:13:42,509 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 872
2020-03-24 10:13:42,509 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,509 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,509 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,509 [root] DEBUG: Loader: Injecting process 872 (thread 1052) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,509 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,509 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,509 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,509 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,509 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 872
2020-03-24 10:13:42,526 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2016
2020-03-24 10:13:42,526 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,526 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,526 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,526 [root] DEBUG: Loader: Injecting process 2016 (thread 1716) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,526 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,526 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,526 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,526 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,526 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2016
2020-03-24 10:13:42,540 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2016
2020-03-24 10:13:42,540 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,540 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,540 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,540 [root] DEBUG: Loader: Injecting process 2016 (thread 1716) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,540 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,540 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,540 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,540 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,540 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2016
2020-03-24 10:13:42,556 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 608
2020-03-24 10:13:42,556 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,556 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,556 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,556 [root] DEBUG: Loader: Injecting process 608 (thread 3040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,556 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,556 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,556 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,556 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,556 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 608
2020-03-24 10:13:42,572 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 608
2020-03-24 10:13:42,572 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,572 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,572 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,572 [root] DEBUG: Loader: Injecting process 608 (thread 3040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,572 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,572 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,572 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,572 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,572 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 608
2020-03-24 10:13:42,588 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2268
2020-03-24 10:13:42,588 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,588 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,588 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,588 [root] DEBUG: Loader: Injecting process 2268 (thread 2700) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,588 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,588 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,588 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,588 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,588 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2268
2020-03-24 10:13:42,604 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2268
2020-03-24 10:13:42,604 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,604 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,604 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,604 [root] DEBUG: Loader: Injecting process 2268 (thread 2700) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,604 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,618 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,618 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,618 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,618 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2268
2020-03-24 10:13:42,634 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 992
2020-03-24 10:13:42,634 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,634 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,634 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,634 [root] DEBUG: Loader: Injecting process 992 (thread 1548) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,634 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,634 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,634 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,634 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,634 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 992
2020-03-24 10:13:42,650 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 992
2020-03-24 10:13:42,650 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,650 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,665 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,665 [root] DEBUG: Loader: Injecting process 992 (thread 1548) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,665 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,665 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,665 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,665 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,665 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 992
2020-03-24 10:13:42,681 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2616
2020-03-24 10:13:42,681 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,681 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,681 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,681 [root] DEBUG: Loader: Injecting process 2616 (thread 2556) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,681 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,681 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,681 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,681 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,681 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2616
2020-03-24 10:13:42,697 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2616
2020-03-24 10:13:42,697 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,697 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,697 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,697 [root] DEBUG: Loader: Injecting process 2616 (thread 2556) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,697 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,697 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,697 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,697 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,697 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2616
2020-03-24 10:13:42,727 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2252
2020-03-24 10:13:42,727 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,727 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,727 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,727 [root] DEBUG: Loader: Injecting process 2252 (thread 1292) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,727 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,727 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,727 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,727 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,727 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2252
2020-03-24 10:13:42,743 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2252
2020-03-24 10:13:42,743 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,743 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,743 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,743 [root] DEBUG: Loader: Injecting process 2252 (thread 1292) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,743 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,743 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,743 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,743 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,743 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2252
2020-03-24 10:13:42,759 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2288
2020-03-24 10:13:42,759 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,759 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,759 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,759 [root] DEBUG: Loader: Injecting process 2288 (thread 2488) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,759 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,759 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,759 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,759 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,759 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2288
2020-03-24 10:13:42,775 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2288
2020-03-24 10:13:42,775 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,775 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,775 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,775 [root] DEBUG: Loader: Injecting process 2288 (thread 2488) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,775 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,775 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,775 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,775 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,775 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2288
2020-03-24 10:13:42,790 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 264
2020-03-24 10:13:42,790 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,790 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,790 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,790 [root] DEBUG: Loader: Injecting process 264 (thread 1056) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,790 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,790 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,790 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,790 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,790 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 264
2020-03-24 10:13:42,805 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 264
2020-03-24 10:13:42,805 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,805 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,805 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,805 [root] DEBUG: Loader: Injecting process 264 (thread 1056) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,805 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,805 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,805 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,805 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,805 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 264
2020-03-24 10:13:42,822 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1900
2020-03-24 10:13:42,822 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,822 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,822 [root] DEBUG: Loader: Injecting process 1900 (thread 2060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,822 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,822 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,822 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,822 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1900
2020-03-24 10:13:42,838 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1900
2020-03-24 10:13:42,838 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,838 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,838 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,838 [root] DEBUG: Loader: Injecting process 1900 (thread 2060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,838 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,838 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,838 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,838 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,838 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1900
2020-03-24 10:13:42,868 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1012
2020-03-24 10:13:42,868 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,868 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,868 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,868 [root] DEBUG: Loader: Injecting process 1012 (thread 1948) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,868 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,868 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,868 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,868 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,868 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1012
2020-03-24 10:13:42,884 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1012
2020-03-24 10:13:42,884 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,884 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,884 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,884 [root] DEBUG: Loader: Injecting process 1012 (thread 1948) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,884 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,884 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,884 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,884 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,884 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1012
2020-03-24 10:13:42,900 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2952
2020-03-24 10:13:42,900 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,900 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,900 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,900 [root] DEBUG: Loader: Injecting process 2952 (thread 1552) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,900 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,900 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,900 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,900 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,900 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2952
2020-03-24 10:13:42,915 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2952
2020-03-24 10:13:42,915 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,915 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,930 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,930 [root] DEBUG: Loader: Injecting process 2952 (thread 1552) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,930 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,930 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,930 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,930 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,930 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2952
2020-03-24 10:13:42,947 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2668
2020-03-24 10:13:42,947 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,947 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,947 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,947 [root] DEBUG: Loader: Injecting process 2668 (thread 2916) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,947 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,947 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,947 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,947 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,947 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2668
2020-03-24 10:13:42,961 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2668
2020-03-24 10:13:42,961 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,961 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,961 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,961 [root] DEBUG: Loader: Injecting process 2668 (thread 2916) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,961 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,961 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,961 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,961 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,961 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2668
2020-03-24 10:13:42,977 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2964
2020-03-24 10:13:42,977 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,977 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,977 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,977 [root] DEBUG: Loader: Injecting process 2964 (thread 2484) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,977 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,977 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,977 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,977 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,977 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2964
2020-03-24 10:13:42,993 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2964
2020-03-24 10:13:42,993 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,993 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:42,993 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:42,993 [root] DEBUG: Loader: Injecting process 2964 (thread 2484) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,993 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,993 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,993 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,993 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:42,993 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2964
2020-03-24 10:13:43,009 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1460
2020-03-24 10:13:43,009 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,009 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,009 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,009 [root] DEBUG: Loader: Injecting process 1460 (thread 2344) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,009 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,009 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,009 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,009 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,009 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1460
2020-03-24 10:13:43,025 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1460
2020-03-24 10:13:43,025 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,025 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,025 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,025 [root] DEBUG: Loader: Injecting process 1460 (thread 2344) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,025 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,025 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,025 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,025 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,025 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1460
2020-03-24 10:13:43,039 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 920
2020-03-24 10:13:43,039 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,039 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,039 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,039 [root] DEBUG: Loader: Injecting process 920 (thread 3016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,039 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,039 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,039 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,039 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,039 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 920
2020-03-24 10:13:43,055 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 920
2020-03-24 10:13:43,055 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,055 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,055 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,055 [root] DEBUG: Loader: Injecting process 920 (thread 3016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,055 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,055 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,055 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,055 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,055 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 920
2020-03-24 10:13:43,086 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 968
2020-03-24 10:13:43,086 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,086 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,086 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,086 [root] DEBUG: Loader: Injecting process 968 (thread 560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,086 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,086 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,086 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,086 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,086 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 968
2020-03-24 10:13:43,102 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 968
2020-03-24 10:13:43,102 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,102 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,102 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,102 [root] DEBUG: Loader: Injecting process 968 (thread 560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,102 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,102 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,102 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,102 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,102 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 968
2020-03-24 10:13:43,118 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1332
2020-03-24 10:13:43,118 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,118 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,118 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,118 [root] DEBUG: Loader: Injecting process 1332 (thread 1504) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,118 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,118 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,118 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,118 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,118 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1332
2020-03-24 10:13:43,134 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1332
2020-03-24 10:13:43,134 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,134 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,134 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,134 [root] DEBUG: Loader: Injecting process 1332 (thread 1504) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,134 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,134 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,134 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,134 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,134 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1332
2020-03-24 10:13:43,150 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2284
2020-03-24 10:13:43,150 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,150 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,150 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,150 [root] DEBUG: Loader: Injecting process 2284 (thread 2076) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,150 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,150 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,150 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,150 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,150 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2284
2020-03-24 10:13:43,164 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2284
2020-03-24 10:13:43,164 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,164 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,164 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,164 [root] DEBUG: Loader: Injecting process 2284 (thread 2076) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,164 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,164 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,164 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,164 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,164 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2284
2020-03-24 10:13:43,180 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2860
2020-03-24 10:13:43,180 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,180 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,180 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,180 [root] DEBUG: Loader: Injecting process 2860 (thread 1684) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,180 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,180 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,180 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,180 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,180 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2860
2020-03-24 10:13:43,196 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2860
2020-03-24 10:13:43,196 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,196 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,196 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,196 [root] DEBUG: Loader: Injecting process 2860 (thread 1684) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,196 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,196 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,196 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,196 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,196 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2860
2020-03-24 10:13:43,211 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2160
2020-03-24 10:13:43,211 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,211 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,211 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,211 [root] DEBUG: Loader: Injecting process 2160 (thread 1588) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,211 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,211 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,211 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,211 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,211 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2160
2020-03-24 10:13:43,227 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2160
2020-03-24 10:13:43,227 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,227 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,227 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,227 [root] DEBUG: Loader: Injecting process 2160 (thread 1588) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,227 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,227 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,227 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,243 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,243 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2160
2020-03-24 10:13:43,259 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2808
2020-03-24 10:13:43,259 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,259 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,259 [root] DEBUG: Loader: Injecting process 2808 (thread 2640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,259 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,259 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2808
2020-03-24 10:13:43,273 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2808
2020-03-24 10:13:43,273 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,273 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,273 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,273 [root] DEBUG: Loader: Injecting process 2808 (thread 2640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,273 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,273 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,273 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,273 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,289 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2808
2020-03-24 10:13:43,305 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2500
2020-03-24 10:13:43,305 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,305 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,305 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,305 [root] DEBUG: Loader: Injecting process 2500 (thread 3020) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,305 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,305 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,305 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,305 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,305 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2500
2020-03-24 10:13:43,321 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2500
2020-03-24 10:13:43,321 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,321 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,321 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,321 [root] DEBUG: Loader: Injecting process 2500 (thread 3020) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,321 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,321 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,321 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,321 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,321 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2500
2020-03-24 10:13:43,351 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2148
2020-03-24 10:13:43,351 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,351 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,351 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,351 [root] DEBUG: Loader: Injecting process 2148 (thread 2516) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,351 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,351 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,351 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,351 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,351 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2148
2020-03-24 10:13:43,368 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2148
2020-03-24 10:13:43,368 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,368 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,368 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,368 [root] DEBUG: Loader: Injecting process 2148 (thread 2516) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,368 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,368 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,368 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,368 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,384 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2148
2020-03-24 10:13:43,398 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2684
2020-03-24 10:13:43,398 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,398 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,398 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,398 [root] DEBUG: Loader: Injecting process 2684 (thread 2172) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,398 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,398 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,398 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,398 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,398 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2684
2020-03-24 10:13:43,414 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2684
2020-03-24 10:13:43,414 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,414 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,414 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,414 [root] DEBUG: Loader: Injecting process 2684 (thread 2172) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,414 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,414 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,414 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,414 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,430 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2684
2020-03-24 10:13:43,446 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2380
2020-03-24 10:13:43,446 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,446 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,446 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,446 [root] DEBUG: Loader: Injecting process 2380 (thread 2892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,446 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,446 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,446 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,446 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,446 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2380
2020-03-24 10:13:43,461 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2380
2020-03-24 10:13:43,461 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,461 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,461 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,461 [root] DEBUG: Loader: Injecting process 2380 (thread 2892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,461 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,461 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,461 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,461 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,461 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2380
2020-03-24 10:13:43,476 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1640
2020-03-24 10:13:43,476 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,476 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,476 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,476 [root] DEBUG: Loader: Injecting process 1640 (thread 1760) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,476 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,476 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,476 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,476 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,476 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1640
2020-03-24 10:13:43,493 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1640
2020-03-24 10:13:43,493 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,493 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,493 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,493 [root] DEBUG: Loader: Injecting process 1640 (thread 1760) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,493 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,493 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,493 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1640
2020-03-24 10:13:43,507 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2524
2020-03-24 10:13:43,507 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,507 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,507 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,507 [root] DEBUG: Loader: Injecting process 2524 (thread 2416) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,507 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,507 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,507 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,507 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,507 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2524
2020-03-24 10:13:43,523 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2524
2020-03-24 10:13:43,523 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,523 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,523 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,523 [root] DEBUG: Loader: Injecting process 2524 (thread 2416) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,523 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,523 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,523 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,523 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,523 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2524
2020-03-24 10:13:43,555 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2764
2020-03-24 10:13:43,555 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,555 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,555 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,555 [root] DEBUG: Loader: Injecting process 2764 (thread 2576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,555 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,555 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,555 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,555 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,555 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2764
2020-03-24 10:13:43,571 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2764
2020-03-24 10:13:43,571 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,571 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,571 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,571 [root] DEBUG: Loader: Injecting process 2764 (thread 2576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,571 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,571 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,585 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,585 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,585 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2764
2020-03-24 10:13:43,601 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1828
2020-03-24 10:13:43,601 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,601 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,601 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,601 [root] DEBUG: Loader: Injecting process 1828 (thread 2896) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,601 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,601 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,601 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,601 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,601 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1828
2020-03-24 10:13:43,618 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1828
2020-03-24 10:13:43,618 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,618 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,618 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,618 [root] DEBUG: Loader: Injecting process 1828 (thread 2896) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,618 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,632 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,632 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,632 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,632 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1828
2020-03-24 10:13:43,648 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2784
2020-03-24 10:13:43,648 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,648 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,648 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,648 [root] DEBUG: Loader: Injecting process 2784 (thread 2228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,648 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,648 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,648 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,648 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,648 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2784
2020-03-24 10:13:43,664 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2784
2020-03-24 10:13:43,664 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,664 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,680 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,680 [root] DEBUG: Loader: Injecting process 2784 (thread 2228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,680 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,680 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,680 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,680 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,680 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2784
2020-03-24 10:13:43,696 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2608
2020-03-24 10:13:43,696 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,696 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,696 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,696 [root] DEBUG: Loader: Injecting process 2608 (thread 2168) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,696 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,696 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,696 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,696 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,696 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2608
2020-03-24 10:13:43,710 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2608
2020-03-24 10:13:43,710 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,710 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,710 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,710 [root] DEBUG: Loader: Injecting process 2608 (thread 2168) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,710 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,710 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,710 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,710 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,710 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2608
2020-03-24 10:13:43,726 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 912
2020-03-24 10:13:43,726 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,726 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,726 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,726 [root] DEBUG: Loader: Injecting process 912 (thread 2712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,726 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,726 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,726 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,726 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,726 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 912
2020-03-24 10:13:43,742 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 912
2020-03-24 10:13:43,742 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,742 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,742 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,742 [root] DEBUG: Loader: Injecting process 912 (thread 2712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,742 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,742 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,742 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,742 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,742 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 912
2020-03-24 10:13:43,757 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2176
2020-03-24 10:13:43,757 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,757 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,757 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,757 [root] DEBUG: Loader: Injecting process 2176 (thread 2128) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,757 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,757 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,757 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,757 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,757 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2176
2020-03-24 10:13:43,773 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2176
2020-03-24 10:13:43,773 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,773 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,773 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,789 [root] DEBUG: Loader: Injecting process 2176 (thread 2128) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,789 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,789 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,789 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,789 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,789 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2176
2020-03-24 10:13:43,805 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1088
2020-03-24 10:13:43,805 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,805 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,805 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,805 [root] DEBUG: Loader: Injecting process 1088 (thread 2888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,805 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,805 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,805 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,805 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,805 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1088
2020-03-24 10:13:43,819 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1088
2020-03-24 10:13:43,819 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,819 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,819 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,819 [root] DEBUG: Loader: Injecting process 1088 (thread 2888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,819 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,819 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,835 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,835 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,835 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1088
2020-03-24 10:13:43,851 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 828
2020-03-24 10:13:43,851 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,851 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,851 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,851 [root] DEBUG: Loader: Injecting process 828 (thread 2492) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,851 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,851 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,851 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,851 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,851 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 828
2020-03-24 10:13:43,867 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 828
2020-03-24 10:13:43,867 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,867 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,867 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,867 [root] DEBUG: Loader: Injecting process 828 (thread 2492) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,867 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,867 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,867 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,867 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,867 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 828
2020-03-24 10:13:43,882 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3028
2020-03-24 10:13:43,882 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,882 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,882 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,882 [root] DEBUG: Loader: Injecting process 3028 (thread 2948) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,882 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,882 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,882 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,882 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,882 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3028
2020-03-24 10:13:43,898 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3028
2020-03-24 10:13:43,898 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,898 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,898 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,898 [root] DEBUG: Loader: Injecting process 3028 (thread 2948) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,898 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,898 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,898 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,898 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,898 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3028
2020-03-24 10:13:43,914 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1932
2020-03-24 10:13:43,914 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,914 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,914 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,914 [root] DEBUG: Loader: Injecting process 1932 (thread 1216) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,914 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,914 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,914 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,914 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,914 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1932
2020-03-24 10:13:43,930 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1932
2020-03-24 10:13:43,930 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,930 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,930 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,930 [root] DEBUG: Loader: Injecting process 1932 (thread 1216) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,930 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,930 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,930 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,930 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,944 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1932
2020-03-24 10:13:43,976 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2908
2020-03-24 10:13:43,976 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,976 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:43,976 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:43,976 [root] DEBUG: Loader: Injecting process 2908 (thread 1744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,976 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,976 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,976 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,976 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:43,976 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2908
2020-03-24 10:13:43,992 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2908
2020-03-24 10:13:43,992 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,992 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,007 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,007 [root] DEBUG: Loader: Injecting process 2908 (thread 1744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,007 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,007 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,007 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,007 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,007 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2908
2020-03-24 10:13:44,023 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2612
2020-03-24 10:13:44,023 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,023 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,023 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,023 [root] DEBUG: Loader: Injecting process 2612 (thread 3060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,023 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,023 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,023 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,023 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,023 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2612
2020-03-24 10:13:44,039 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2612
2020-03-24 10:13:44,039 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,039 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,039 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,039 [root] DEBUG: Loader: Injecting process 2612 (thread 3060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,039 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,053 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,053 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,053 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,053 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2612
2020-03-24 10:13:44,069 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1912
2020-03-24 10:13:44,069 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,069 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,069 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,069 [root] DEBUG: Loader: Injecting process 1912 (thread 908) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,069 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,069 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,069 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,069 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,069 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1912
2020-03-24 10:13:44,085 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1912
2020-03-24 10:13:44,085 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,085 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,101 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,101 [root] DEBUG: Loader: Injecting process 1912 (thread 908) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,101 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,101 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,101 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,101 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,101 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1912
2020-03-24 10:13:44,117 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2448
2020-03-24 10:13:44,117 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,117 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,117 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,117 [root] DEBUG: Loader: Injecting process 2448 (thread 2376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,117 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,117 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,117 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,117 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,117 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2448
2020-03-24 10:13:44,131 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2448
2020-03-24 10:13:44,131 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,131 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,131 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,131 [root] DEBUG: Loader: Injecting process 2448 (thread 2376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,131 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,131 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,131 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,131 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,148 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2448
2020-03-24 10:13:44,164 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1520
2020-03-24 10:13:44,164 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,164 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,164 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,164 [root] DEBUG: Loader: Injecting process 1520 (thread 2392) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,164 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,164 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,164 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,164 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,164 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1520
2020-03-24 10:13:44,178 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1520
2020-03-24 10:13:44,178 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,178 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,178 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,178 [root] DEBUG: Loader: Injecting process 1520 (thread 2392) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,178 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,178 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,178 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,178 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,178 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1520
2020-03-24 10:13:44,210 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2496
2020-03-24 10:13:44,210 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,210 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,210 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,210 [root] DEBUG: Loader: Injecting process 2496 (thread 2300) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,210 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,210 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,210 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,210 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,210 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2496
2020-03-24 10:13:44,226 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2496
2020-03-24 10:13:44,226 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,226 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,226 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,226 [root] DEBUG: Loader: Injecting process 2496 (thread 2300) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,226 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,226 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,226 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,226 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2496
2020-03-24 10:13:44,242 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2652
2020-03-24 10:13:44,242 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,242 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,242 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,242 [root] DEBUG: Loader: Injecting process 2652 (thread 2720) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,242 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,242 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,242 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,242 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,242 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2652
2020-03-24 10:13:44,256 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2652
2020-03-24 10:13:44,256 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,256 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,256 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,256 [root] DEBUG: Loader: Injecting process 2652 (thread 2720) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,256 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,256 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,273 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,273 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,273 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2652
2020-03-24 10:13:44,288 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1856
2020-03-24 10:13:44,288 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,288 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,288 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,288 [root] DEBUG: Loader: Injecting process 1856 (thread 1752) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,288 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,288 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,288 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,288 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,288 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1856
2020-03-24 10:13:44,303 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1856
2020-03-24 10:13:44,303 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,303 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,303 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,303 [root] DEBUG: Loader: Injecting process 1856 (thread 1752) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,303 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,303 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,303 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,319 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,319 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1856
2020-03-24 10:13:44,335 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1384
2020-03-24 10:13:44,335 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,335 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,335 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,335 [root] DEBUG: Loader: Injecting process 1384 (thread 524) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,335 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,335 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,335 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,335 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,335 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1384
2020-03-24 10:13:44,351 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1384
2020-03-24 10:13:44,351 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,351 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,351 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,351 [root] DEBUG: Loader: Injecting process 1384 (thread 524) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,351 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,351 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,351 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,351 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,351 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1384
2020-03-24 10:13:44,381 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2708
2020-03-24 10:13:44,381 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,381 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,381 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,381 [root] DEBUG: Loader: Injecting process 2708 (thread 2628) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,381 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,381 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,381 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,381 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,381 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2708
2020-03-24 10:13:44,398 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2708
2020-03-24 10:13:44,398 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,398 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,398 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,398 [root] DEBUG: Loader: Injecting process 2708 (thread 2628) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,398 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,398 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,398 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,413 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,413 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2708
2020-03-24 10:13:44,428 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2444
2020-03-24 10:13:44,428 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,428 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,428 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,428 [root] DEBUG: Loader: Injecting process 2444 (thread 2116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,428 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,428 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,428 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,428 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,428 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2444
2020-03-24 10:13:44,444 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2444
2020-03-24 10:13:44,444 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,444 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,460 [root] DEBUG: Loader: Injecting process 2444 (thread 2116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,460 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,460 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,460 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,460 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,460 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2444
2020-03-24 10:13:44,476 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 580
2020-03-24 10:13:44,476 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,476 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,476 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,476 [root] DEBUG: Loader: Injecting process 580 (thread 2980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,476 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,476 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,476 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,476 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,476 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 580
2020-03-24 10:13:44,490 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 580
2020-03-24 10:13:44,490 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,490 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,490 [root] DEBUG: Loader: Injecting process 580 (thread 2980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,490 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,490 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,490 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,490 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,490 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 580
2020-03-24 10:13:44,506 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1060
2020-03-24 10:13:44,506 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,506 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,506 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,506 [root] DEBUG: Loader: Injecting process 1060 (thread 1340) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,506 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,506 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,506 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,506 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,506 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1060
2020-03-24 10:13:44,522 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1060
2020-03-24 10:13:44,522 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,522 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,522 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,522 [root] DEBUG: Loader: Injecting process 1060 (thread 1340) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,522 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,522 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,522 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,522 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,538 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1060
2020-03-24 10:13:44,553 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2736
2020-03-24 10:13:44,553 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,553 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,553 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,553 [root] DEBUG: Loader: Injecting process 2736 (thread 3064) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,553 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,553 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,553 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,553 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,553 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2736
2020-03-24 10:13:44,569 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2736
2020-03-24 10:13:44,569 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,569 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,569 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,569 [root] DEBUG: Loader: Injecting process 2736 (thread 3064) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,569 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,569 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,585 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,585 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,585 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2736
2020-03-24 10:13:44,599 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1956
2020-03-24 10:13:44,599 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,599 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,599 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,599 [root] DEBUG: Loader: Injecting process 1956 (thread 2532) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,599 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,599 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,599 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,599 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,599 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1956
2020-03-24 10:13:44,615 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 1956
2020-03-24 10:13:44,615 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,615 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,615 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,615 [root] DEBUG: Loader: Injecting process 1956 (thread 2532) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,615 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,615 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,615 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,615 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,615 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1956
2020-03-24 10:13:44,647 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2428
2020-03-24 10:13:44,647 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,647 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,647 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,647 [root] DEBUG: Loader: Injecting process 2428 (thread 2360) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,647 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,647 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,647 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,647 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,647 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2428
2020-03-24 10:13:44,663 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2428
2020-03-24 10:13:44,663 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,663 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,663 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,663 [root] DEBUG: Loader: Injecting process 2428 (thread 2360) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,677 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,677 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,677 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,677 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,677 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2428
2020-03-24 10:13:44,694 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2328
2020-03-24 10:13:44,694 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,694 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,694 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,694 [root] DEBUG: Loader: Injecting process 2328 (thread 2072) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,694 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,694 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,694 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,694 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,694 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2328
2020-03-24 10:13:44,710 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2328
2020-03-24 10:13:44,710 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,710 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,724 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,724 [root] DEBUG: Loader: Injecting process 2328 (thread 2072) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,724 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,724 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,724 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,724 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,724 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2328
2020-03-24 10:13:44,740 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3152
2020-03-24 10:13:44,740 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,740 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,740 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,740 [root] DEBUG: Loader: Injecting process 3152 (thread 3156) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,740 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,740 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,740 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,740 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,740 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3152
2020-03-24 10:13:44,756 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3152
2020-03-24 10:13:44,756 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,756 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,756 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,772 [root] DEBUG: Loader: Injecting process 3152 (thread 3156) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,772 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,772 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,772 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,772 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,772 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3152
2020-03-24 10:13:44,788 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3248
2020-03-24 10:13:44,788 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,788 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,788 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,788 [root] DEBUG: Loader: Injecting process 3248 (thread 3252) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,788 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,788 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,788 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,788 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,788 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3248
2020-03-24 10:13:44,802 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3248
2020-03-24 10:13:44,802 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,802 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,802 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,802 [root] DEBUG: Loader: Injecting process 3248 (thread 3252) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,802 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,819 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,819 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,819 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,819 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3248
2020-03-24 10:13:44,834 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3344
2020-03-24 10:13:44,834 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,834 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,834 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,834 [root] DEBUG: Loader: Injecting process 3344 (thread 3348) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,834 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,834 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,834 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,834 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,834 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3344
2020-03-24 10:13:44,849 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3344
2020-03-24 10:13:44,849 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,849 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,849 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,849 [root] DEBUG: Loader: Injecting process 3344 (thread 3348) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,865 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,865 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,865 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,865 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,865 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3344
2020-03-24 10:13:44,881 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3440
2020-03-24 10:13:44,881 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,881 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,881 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,881 [root] DEBUG: Loader: Injecting process 3440 (thread 3444) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,881 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,881 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,881 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,881 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,881 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3440
2020-03-24 10:13:44,897 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3440
2020-03-24 10:13:44,897 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,897 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,897 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,897 [root] DEBUG: Loader: Injecting process 3440 (thread 3444) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,897 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,911 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,911 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,911 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,911 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3440
2020-03-24 10:13:44,927 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3536
2020-03-24 10:13:44,927 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,927 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,927 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,927 [root] DEBUG: Loader: Injecting process 3536 (thread 3540) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,927 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,927 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,927 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,927 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,927 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3536
2020-03-24 10:13:44,944 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3536
2020-03-24 10:13:44,944 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,944 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,944 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,944 [root] DEBUG: Loader: Injecting process 3536 (thread 3540) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,944 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,944 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,959 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,959 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,959 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3536
2020-03-24 10:13:44,990 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3632
2020-03-24 10:13:44,990 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,990 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:44,990 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:44,990 [root] DEBUG: Loader: Injecting process 3632 (thread 3636) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,990 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,990 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,990 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,990 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:44,990 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3632
2020-03-24 10:13:45,006 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3632
2020-03-24 10:13:45,006 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,006 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,022 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,022 [root] DEBUG: Loader: Injecting process 3632 (thread 3636) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,022 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,022 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,022 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,022 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,022 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3632
2020-03-24 10:13:45,036 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3728
2020-03-24 10:13:45,036 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,036 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,036 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,036 [root] DEBUG: Loader: Injecting process 3728 (thread 3732) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,036 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,036 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,036 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,036 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,036 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3728
2020-03-24 10:13:45,052 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3728
2020-03-24 10:13:45,052 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,052 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,052 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,052 [root] DEBUG: Loader: Injecting process 3728 (thread 3732) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,052 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,052 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,068 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,068 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,068 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3728
2020-03-24 10:13:45,084 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3824
2020-03-24 10:13:45,084 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,084 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,084 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,084 [root] DEBUG: Loader: Injecting process 3824 (thread 3828) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,084 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,084 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,084 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,084 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,084 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3824
2020-03-24 10:13:45,099 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3824
2020-03-24 10:13:45,099 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,099 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,099 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,099 [root] DEBUG: Loader: Injecting process 3824 (thread 3828) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,099 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,099 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,099 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,099 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,115 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3824
2020-03-24 10:13:45,131 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3920
2020-03-24 10:13:45,131 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,131 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,131 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,131 [root] DEBUG: Loader: Injecting process 3920 (thread 3924) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,131 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,131 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,131 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,131 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,131 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3920
2020-03-24 10:13:45,145 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3920
2020-03-24 10:13:45,145 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,145 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,145 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,145 [root] DEBUG: Loader: Injecting process 3920 (thread 3924) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,145 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,145 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,145 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,145 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,161 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3920
2020-03-24 10:13:45,177 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4016
2020-03-24 10:13:45,177 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,177 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,177 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,177 [root] DEBUG: Loader: Injecting process 4016 (thread 4020) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,177 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,177 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,177 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,177 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,177 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4016
2020-03-24 10:13:45,193 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4016
2020-03-24 10:13:45,193 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,193 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,209 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,209 [root] DEBUG: Loader: Injecting process 4016 (thread 4020) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,209 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,209 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,209 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,209 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,209 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4016
2020-03-24 10:13:45,223 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3100
2020-03-24 10:13:45,223 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,223 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,223 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,223 [root] DEBUG: Loader: Injecting process 3100 (thread 3104) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,223 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,223 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,223 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,223 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,223 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3100
2020-03-24 10:13:45,240 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3100
2020-03-24 10:13:45,240 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,240 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,256 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,256 [root] DEBUG: Loader: Injecting process 3100 (thread 3104) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,256 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,256 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,256 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,256 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,256 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3100
2020-03-24 10:13:45,270 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3168
2020-03-24 10:13:45,270 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,270 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,270 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,270 [root] DEBUG: Loader: Injecting process 3168 (thread 3220) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,270 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,270 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,270 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,270 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,270 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3168
2020-03-24 10:13:45,286 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3168
2020-03-24 10:13:45,286 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,286 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,302 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,302 [root] DEBUG: Loader: Injecting process 3168 (thread 3220) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,302 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,302 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,302 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,302 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,302 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3168
2020-03-24 10:13:45,318 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3328
2020-03-24 10:13:45,318 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,318 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,318 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,318 [root] DEBUG: Loader: Injecting process 3328 (thread 3332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,318 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,318 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,318 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,318 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,318 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3328
2020-03-24 10:13:45,334 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3328
2020-03-24 10:13:45,334 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,334 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,334 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,334 [root] DEBUG: Loader: Injecting process 3328 (thread 3332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,334 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,334 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,348 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,348 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,348 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3328
2020-03-24 10:13:45,365 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3404
2020-03-24 10:13:45,365 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,365 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,365 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,365 [root] DEBUG: Loader: Injecting process 3404 (thread 3400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,365 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,365 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,365 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,365 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,365 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3404
2020-03-24 10:13:45,380 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3404
2020-03-24 10:13:45,380 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,380 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,380 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,380 [root] DEBUG: Loader: Injecting process 3404 (thread 3400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,380 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,380 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,380 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,380 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,395 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3404
2020-03-24 10:13:45,411 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3564
2020-03-24 10:13:45,411 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,411 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,411 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,411 [root] DEBUG: Loader: Injecting process 3564 (thread 3568) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,411 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,411 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,411 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,411 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,411 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3564
2020-03-24 10:13:45,427 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3564
2020-03-24 10:13:45,427 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,427 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,427 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,427 [root] DEBUG: Loader: Injecting process 3564 (thread 3568) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,427 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,427 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,427 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,443 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,443 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3564
2020-03-24 10:13:45,457 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3676
2020-03-24 10:13:45,457 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,457 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,457 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,457 [root] DEBUG: Loader: Injecting process 3676 (thread 3680) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,457 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,457 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,457 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,457 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,457 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3676
2020-03-24 10:13:45,473 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3676
2020-03-24 10:13:45,473 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,473 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,473 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,473 [root] DEBUG: Loader: Injecting process 3676 (thread 3680) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,473 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,473 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,473 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,473 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,473 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3676
2020-03-24 10:13:45,505 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3744
2020-03-24 10:13:45,505 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,505 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,505 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,505 [root] DEBUG: Loader: Injecting process 3744 (thread 3796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,505 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,505 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,505 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,505 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,505 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3744
2020-03-24 10:13:45,520 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3744
2020-03-24 10:13:45,520 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,520 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,520 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,520 [root] DEBUG: Loader: Injecting process 3744 (thread 3796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,520 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,536 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,536 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,536 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,536 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3744
2020-03-24 10:13:45,552 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3904
2020-03-24 10:13:45,552 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,552 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,552 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,552 [root] DEBUG: Loader: Injecting process 3904 (thread 3908) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,552 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,552 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,552 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,552 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,552 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3904
2020-03-24 10:13:45,568 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3904
2020-03-24 10:13:45,568 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,568 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,568 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,568 [root] DEBUG: Loader: Injecting process 3904 (thread 3908) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,568 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,568 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,568 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,568 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,568 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3904
2020-03-24 10:13:45,582 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3980
2020-03-24 10:13:45,582 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,582 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,582 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,582 [root] DEBUG: Loader: Injecting process 3980 (thread 3976) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,582 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,582 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,582 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,582 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,582 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3980
2020-03-24 10:13:45,598 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3980
2020-03-24 10:13:45,598 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,598 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,598 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,598 [root] DEBUG: Loader: Injecting process 3980 (thread 3976) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,598 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,598 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,598 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,598 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,614 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3980
2020-03-24 10:13:45,630 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3132
2020-03-24 10:13:45,630 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,630 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,630 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,630 [root] DEBUG: Loader: Injecting process 3132 (thread 3136) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,630 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,630 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,630 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,630 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,630 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3132
2020-03-24 10:13:45,645 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3132
2020-03-24 10:13:45,645 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,645 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,645 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,645 [root] DEBUG: Loader: Injecting process 3132 (thread 3136) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,645 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,645 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,645 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,645 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,661 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3132
2020-03-24 10:13:45,677 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3244
2020-03-24 10:13:45,677 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,677 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,677 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,677 [root] DEBUG: Loader: Injecting process 3244 (thread 3276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,677 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,677 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,677 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,677 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,677 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3244
2020-03-24 10:13:45,691 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3244
2020-03-24 10:13:45,691 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,691 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,691 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,691 [root] DEBUG: Loader: Injecting process 3244 (thread 3276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,691 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,691 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,691 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,691 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,707 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3244
2020-03-24 10:13:45,723 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3308
2020-03-24 10:13:45,723 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,723 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,723 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,723 [root] DEBUG: Loader: Injecting process 3308 (thread 3412) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,723 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,723 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,723 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,723 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,723 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3308
2020-03-24 10:13:45,739 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3308
2020-03-24 10:13:45,739 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,739 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,739 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,755 [root] DEBUG: Loader: Injecting process 3308 (thread 3412) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,755 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,755 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,755 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,755 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,755 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3308
2020-03-24 10:13:45,769 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3500
2020-03-24 10:13:45,769 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,769 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,769 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,769 [root] DEBUG: Loader: Injecting process 3500 (thread 3496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,769 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,769 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,769 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,769 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,769 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3500
2020-03-24 10:13:45,786 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3500
2020-03-24 10:13:45,786 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,786 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,786 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,786 [root] DEBUG: Loader: Injecting process 3500 (thread 3496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,786 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,786 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,802 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,802 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,802 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3500
2020-03-24 10:13:45,816 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3600
2020-03-24 10:13:45,816 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,816 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,816 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,816 [root] DEBUG: Loader: Injecting process 3600 (thread 3624) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,816 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,816 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,816 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,816 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,816 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3600
2020-03-24 10:13:45,832 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3600
2020-03-24 10:13:45,832 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,832 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,832 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,832 [root] DEBUG: Loader: Injecting process 3600 (thread 3624) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,832 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,832 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,832 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,832 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,832 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3600
2020-03-24 10:13:45,848 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3792
2020-03-24 10:13:45,848 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,848 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,848 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,848 [root] DEBUG: Loader: Injecting process 3792 (thread 3788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,848 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,848 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,848 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,848 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,848 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3792
2020-03-24 10:13:45,864 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3792
2020-03-24 10:13:45,864 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,864 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,864 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,864 [root] DEBUG: Loader: Injecting process 3792 (thread 3788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,864 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,864 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,864 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,864 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,864 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3792
2020-03-24 10:13:45,894 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3960
2020-03-24 10:13:45,894 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,894 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,894 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,894 [root] DEBUG: Loader: Injecting process 3960 (thread 3964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,894 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,894 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,894 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,894 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,894 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3960
2020-03-24 10:13:45,911 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3960
2020-03-24 10:13:45,911 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,911 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,911 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,911 [root] DEBUG: Loader: Injecting process 3960 (thread 3964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,926 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,926 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,926 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,926 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,926 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3960
2020-03-24 10:13:45,941 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4044
2020-03-24 10:13:45,941 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,941 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,941 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,941 [root] DEBUG: Loader: Injecting process 4044 (thread 3088) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,941 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,941 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,941 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,941 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,941 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4044
2020-03-24 10:13:45,957 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4044
2020-03-24 10:13:45,957 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,957 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,957 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,957 [root] DEBUG: Loader: Injecting process 4044 (thread 3088) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,957 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,957 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,957 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,973 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,973 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4044
2020-03-24 10:13:45,989 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3212
2020-03-24 10:13:45,989 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,989 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:45,989 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:45,989 [root] DEBUG: Loader: Injecting process 3212 (thread 3208) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,989 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,989 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,989 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,989 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:45,989 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3212
2020-03-24 10:13:46,019 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3212
2020-03-24 10:13:46,019 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,019 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,019 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,019 [root] DEBUG: Loader: Injecting process 3212 (thread 3208) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,019 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,019 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,019 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,019 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,019 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3212
2020-03-24 10:13:46,036 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3372
2020-03-24 10:13:46,036 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,036 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,036 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,036 [root] DEBUG: Loader: Injecting process 3372 (thread 3280) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,036 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,036 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,036 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,036 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,036 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3372
2020-03-24 10:13:46,051 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3372
2020-03-24 10:13:46,051 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,051 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,066 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,066 [root] DEBUG: Loader: Injecting process 3372 (thread 3280) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,066 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,066 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,066 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,066 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,066 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3372
2020-03-24 10:13:46,082 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3532
2020-03-24 10:13:46,082 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,082 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,082 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,082 [root] DEBUG: Loader: Injecting process 3532 (thread 3556) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,082 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,082 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,082 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,082 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,082 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3532
2020-03-24 10:13:46,098 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3532
2020-03-24 10:13:46,098 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,098 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,114 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,114 [root] DEBUG: Loader: Injecting process 3532 (thread 3556) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,114 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,114 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,114 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,114 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,114 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3532
2020-03-24 10:13:46,128 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3700
2020-03-24 10:13:46,128 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,128 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,128 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,128 [root] DEBUG: Loader: Injecting process 3700 (thread 3712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,128 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,128 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,128 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,128 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,128 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3700
2020-03-24 10:13:46,144 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3700
2020-03-24 10:13:46,144 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,144 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,144 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,144 [root] DEBUG: Loader: Injecting process 3700 (thread 3712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,160 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,160 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,160 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,160 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,160 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3700
2020-03-24 10:13:46,176 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3820
2020-03-24 10:13:46,176 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,176 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,176 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,176 [root] DEBUG: Loader: Injecting process 3820 (thread 3860) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,176 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,176 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,176 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,176 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,176 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3820
2020-03-24 10:13:46,191 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3820
2020-03-24 10:13:46,207 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,207 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,207 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,207 [root] DEBUG: Loader: Injecting process 3820 (thread 3860) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,207 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,207 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,207 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,207 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,207 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3820
2020-03-24 10:13:46,237 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4036
2020-03-24 10:13:46,237 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,237 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,237 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,237 [root] DEBUG: Loader: Injecting process 4036 (thread 4032) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,237 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,237 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,237 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,237 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,237 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4036
2020-03-24 10:13:46,253 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4036
2020-03-24 10:13:46,253 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,253 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,253 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,253 [root] DEBUG: Loader: Injecting process 4036 (thread 4032) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,269 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,269 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,269 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,269 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,269 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4036
2020-03-24 10:13:46,285 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3188
2020-03-24 10:13:46,285 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,285 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,285 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,285 [root] DEBUG: Loader: Injecting process 3188 (thread 3184) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,285 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,285 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,285 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,285 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,285 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3188
2020-03-24 10:13:46,301 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3188
2020-03-24 10:13:46,301 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,315 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,315 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,315 [root] DEBUG: Loader: Injecting process 3188 (thread 3184) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,315 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,315 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,315 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,315 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,315 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3188
2020-03-24 10:13:46,332 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3392
2020-03-24 10:13:46,332 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,332 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,332 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,332 [root] DEBUG: Loader: Injecting process 3392 (thread 3408) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,332 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,332 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,332 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,332 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,348 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3392
2020-03-24 10:13:46,348 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3392
2020-03-24 10:13:46,348 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,348 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,362 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,362 [root] DEBUG: Loader: Injecting process 3392 (thread 3408) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,362 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,362 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,362 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,362 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,362 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3392
2020-03-24 10:13:46,378 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3628
2020-03-24 10:13:46,378 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,378 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,378 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,378 [root] DEBUG: Loader: Injecting process 3628 (thread 3660) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,378 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,378 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,378 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,378 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,378 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3628
2020-03-24 10:13:46,394 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3628
2020-03-24 10:13:46,394 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,394 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,394 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,394 [root] DEBUG: Loader: Injecting process 3628 (thread 3660) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,394 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,394 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,394 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,410 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,410 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3628
2020-03-24 10:13:46,426 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3708
2020-03-24 10:13:46,426 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,426 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,426 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,426 [root] DEBUG: Loader: Injecting process 3708 (thread 3808) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,426 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,426 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,426 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,426 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,426 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3708
2020-03-24 10:13:46,440 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3708
2020-03-24 10:13:46,440 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,440 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,457 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,457 [root] DEBUG: Loader: Injecting process 3708 (thread 3808) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,457 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,457 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,457 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,457 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,457 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3708
2020-03-24 10:13:46,471 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3884
2020-03-24 10:13:46,471 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,471 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,471 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,471 [root] DEBUG: Loader: Injecting process 3884 (thread 4060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,471 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,471 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,471 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,471 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,471 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3884
2020-03-24 10:13:46,487 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3884
2020-03-24 10:13:46,487 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,487 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,487 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,487 [root] DEBUG: Loader: Injecting process 3884 (thread 4060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,487 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,487 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,487 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,487 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,503 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3884
2020-03-24 10:13:46,519 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4072
2020-03-24 10:13:46,519 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,519 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,519 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,519 [root] DEBUG: Loader: Injecting process 4072 (thread 4068) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,519 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,519 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,519 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,519 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,519 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4072
2020-03-24 10:13:46,535 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4072
2020-03-24 10:13:46,535 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,535 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,535 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,535 [root] DEBUG: Loader: Injecting process 4072 (thread 4068) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,535 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,535 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,535 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,535 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,535 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4072
2020-03-24 10:13:46,565 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3364
2020-03-24 10:13:46,565 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,565 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,565 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,565 [root] DEBUG: Loader: Injecting process 3364 (thread 3360) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,565 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,565 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,565 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,565 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,565 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3364
2020-03-24 10:13:46,582 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3364
2020-03-24 10:13:46,582 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,582 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,582 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,582 [root] DEBUG: Loader: Injecting process 3364 (thread 3360) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,582 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,582 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,582 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,596 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,596 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3364
2020-03-24 10:13:46,612 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3584
2020-03-24 10:13:46,612 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,612 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,612 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,612 [root] DEBUG: Loader: Injecting process 3584 (thread 3580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,612 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,612 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,612 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,612 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,612 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3584
2020-03-24 10:13:46,628 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3584
2020-03-24 10:13:46,628 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,628 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,644 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,644 [root] DEBUG: Loader: Injecting process 3584 (thread 3580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,644 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,644 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,644 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,644 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,644 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3584
2020-03-24 10:13:46,660 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3840
2020-03-24 10:13:46,660 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,660 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,660 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,660 [root] DEBUG: Loader: Injecting process 3840 (thread 3996) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,660 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,660 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,660 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,660 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,660 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3840
2020-03-24 10:13:46,674 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3840
2020-03-24 10:13:46,674 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,674 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,674 [root] DEBUG: Loader: Injecting process 3840 (thread 3996) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,674 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,690 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,690 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,690 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,690 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3840
2020-03-24 10:13:46,706 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3120
2020-03-24 10:13:46,706 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,706 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,706 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,706 [root] DEBUG: Loader: Injecting process 3120 (thread 3108) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,706 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,706 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,706 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,706 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,706 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3120
2020-03-24 10:13:46,721 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3120
2020-03-24 10:13:46,721 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,721 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,721 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,721 [root] DEBUG: Loader: Injecting process 3120 (thread 3108) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,721 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,721 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,721 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,721 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,721 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3120
2020-03-24 10:13:46,737 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3232
2020-03-24 10:13:46,737 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,737 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,737 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,737 [root] DEBUG: Loader: Injecting process 3232 (thread 3300) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,737 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,737 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,737 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,737 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,737 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3232
2020-03-24 10:13:46,753 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3232
2020-03-24 10:13:46,753 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,753 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,753 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,753 [root] DEBUG: Loader: Injecting process 3232 (thread 3300) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,753 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,753 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,753 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,753 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,753 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3232
2020-03-24 10:13:46,783 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3688
2020-03-24 10:13:46,783 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,783 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,783 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,783 [root] DEBUG: Loader: Injecting process 3688 (thread 3776) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,783 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,783 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,783 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,783 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,783 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3688
2020-03-24 10:13:46,799 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3688
2020-03-24 10:13:46,799 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,799 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,799 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,799 [root] DEBUG: Loader: Injecting process 3688 (thread 3776) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,799 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,799 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,815 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,815 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,815 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3688
2020-03-24 10:13:46,831 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3988
2020-03-24 10:13:46,831 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,831 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,831 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,831 [root] DEBUG: Loader: Injecting process 3988 (thread 4048) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,831 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,831 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,831 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,831 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,831 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-03-24 10:13:46,846 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3988
2020-03-24 10:13:46,846 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,846 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,846 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,861 [root] DEBUG: Loader: Injecting process 3988 (thread 4048) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,861 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,861 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,861 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,861 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,861 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-03-24 10:13:46,878 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3944
2020-03-24 10:13:46,878 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,878 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,878 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,878 [root] DEBUG: Loader: Injecting process 3944 (thread 3272) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,878 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,878 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,878 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,878 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,878 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3944
2020-03-24 10:13:46,894 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3944
2020-03-24 10:13:46,894 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,894 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,894 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,894 [root] DEBUG: Loader: Injecting process 3944 (thread 3272) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,894 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,908 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,908 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,908 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,908 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3944
2020-03-24 10:13:46,924 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3472
2020-03-24 10:13:46,924 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,924 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,924 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,924 [root] DEBUG: Loader: Injecting process 3472 (thread 3592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,924 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,924 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,924 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,924 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,924 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3472
2020-03-24 10:13:46,940 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3472
2020-03-24 10:13:46,940 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,940 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,940 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,940 [root] DEBUG: Loader: Injecting process 3472 (thread 3592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,940 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,940 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,956 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,956 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,956 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3472
2020-03-24 10:13:46,971 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3812
2020-03-24 10:13:46,971 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,971 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,971 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,971 [root] DEBUG: Loader: Injecting process 3812 (thread 3816) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,971 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,971 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,971 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,971 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,971 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3812
2020-03-24 10:13:46,986 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3812
2020-03-24 10:13:46,986 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,986 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:46,986 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:46,986 [root] DEBUG: Loader: Injecting process 3812 (thread 3816) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,986 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,986 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:46,986 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,003 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,003 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3812
2020-03-24 10:13:47,017 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3316
2020-03-24 10:13:47,017 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,017 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,017 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,017 [root] DEBUG: Loader: Injecting process 3316 (thread 3320) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,017 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,017 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,017 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,017 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,017 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3316
2020-03-24 10:13:47,033 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3316
2020-03-24 10:13:47,033 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,033 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,049 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,049 [root] DEBUG: Loader: Injecting process 3316 (thread 3320) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,049 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,049 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,049 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,049 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,049 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3316
2020-03-24 10:13:47,065 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3764
2020-03-24 10:13:47,065 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,065 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,065 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,065 [root] DEBUG: Loader: Injecting process 3764 (thread 3760) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,065 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,065 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,065 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,065 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,065 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3764
2020-03-24 10:13:47,081 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3764
2020-03-24 10:13:47,081 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,081 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,081 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,081 [root] DEBUG: Loader: Injecting process 3764 (thread 3760) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,081 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,081 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,095 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,095 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,095 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3764
2020-03-24 10:13:47,111 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4004
2020-03-24 10:13:47,111 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,111 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,111 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,111 [root] DEBUG: Loader: Injecting process 4004 (thread 3264) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,111 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,111 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,111 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,111 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,111 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-03-24 10:13:47,128 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4004
2020-03-24 10:13:47,128 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,128 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,128 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,128 [root] DEBUG: Loader: Injecting process 4004 (thread 3264) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,128 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,128 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,128 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,128 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,142 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-03-24 10:13:47,158 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3696
2020-03-24 10:13:47,158 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,158 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,158 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,158 [root] DEBUG: Loader: Injecting process 3696 (thread 3608) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,158 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,158 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,158 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,158 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,174 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3696
2020-03-24 10:13:47,190 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3696
2020-03-24 10:13:47,190 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,190 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,190 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,190 [root] DEBUG: Loader: Injecting process 3696 (thread 3608) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,190 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,190 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,190 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,190 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,190 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3696
2020-03-24 10:13:47,206 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3748
2020-03-24 10:13:47,206 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,206 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,206 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,206 [root] DEBUG: Loader: Injecting process 3748 (thread 3852) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,206 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,206 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,206 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,206 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,206 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-03-24 10:13:47,220 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3748
2020-03-24 10:13:47,220 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,220 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,220 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,220 [root] DEBUG: Loader: Injecting process 3748 (thread 3852) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,220 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,220 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,220 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,220 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,236 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-03-24 10:13:47,252 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3844
2020-03-24 10:13:47,252 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,252 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,252 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,252 [root] DEBUG: Loader: Injecting process 3844 (thread 3956) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,252 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,252 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,252 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,252 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,252 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3844
2020-03-24 10:13:47,267 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3844
2020-03-24 10:13:47,267 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,267 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,267 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,267 [root] DEBUG: Loader: Injecting process 3844 (thread 3956) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,267 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,267 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,283 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,283 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,283 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3844
2020-03-24 10:13:47,299 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4040
2020-03-24 10:13:47,299 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,299 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,299 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,299 [root] DEBUG: Loader: Injecting process 4040 (thread 3116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,299 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,299 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,299 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,299 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,299 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4040
2020-03-24 10:13:47,315 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4040
2020-03-24 10:13:47,315 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,315 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,329 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,329 [root] DEBUG: Loader: Injecting process 4040 (thread 3116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,329 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,329 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,329 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,329 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,329 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4040
2020-03-24 10:13:47,345 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3692
2020-03-24 10:13:47,345 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,345 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,345 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,361 [root] DEBUG: Loader: Injecting process 3692 (thread 3704) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,361 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,361 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,361 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,361 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,361 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3692
2020-03-24 10:13:47,377 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3692
2020-03-24 10:13:47,377 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,377 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,377 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,392 [root] DEBUG: Loader: Injecting process 3692 (thread 3704) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,392 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,392 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,392 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,392 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,392 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3692
2020-03-24 10:13:47,407 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4000
2020-03-24 10:13:47,407 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,407 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,407 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,407 [root] DEBUG: Loader: Injecting process 4000 (thread 4084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,407 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,407 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,407 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,407 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,407 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4000
2020-03-24 10:13:47,424 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4000
2020-03-24 10:13:47,424 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,424 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,440 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,440 [root] DEBUG: Loader: Injecting process 4000 (thread 4084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,440 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,440 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,440 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,440 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,440 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4000
2020-03-24 10:13:47,454 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3380
2020-03-24 10:13:47,454 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,454 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,454 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,454 [root] DEBUG: Loader: Injecting process 3380 (thread 3460) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,454 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,454 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,454 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,454 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,454 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3380
2020-03-24 10:13:47,470 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3380
2020-03-24 10:13:47,470 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,470 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,486 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,486 [root] DEBUG: Loader: Injecting process 3380 (thread 3460) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,486 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,486 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,486 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,486 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,486 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3380
2020-03-24 10:13:47,502 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3196
2020-03-24 10:13:47,502 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,502 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,502 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,502 [root] DEBUG: Loader: Injecting process 3196 (thread 3664) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,502 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,502 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,502 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,502 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,502 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3196
2020-03-24 10:13:47,517 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3196
2020-03-24 10:13:47,517 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,517 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,532 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,532 [root] DEBUG: Loader: Injecting process 3196 (thread 3664) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,532 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,532 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,532 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,532 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,532 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3196
2020-03-24 10:13:47,549 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3200
2020-03-24 10:13:47,549 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,549 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,549 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,549 [root] DEBUG: Loader: Injecting process 3200 (thread 3376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,549 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,549 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,549 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,549 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,549 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3200
2020-03-24 10:13:47,563 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3200
2020-03-24 10:13:47,563 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,563 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,579 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,579 [root] DEBUG: Loader: Injecting process 3200 (thread 3376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,579 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,579 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,579 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,579 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,579 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3200
2020-03-24 10:13:47,595 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3424
2020-03-24 10:13:47,595 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,595 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,595 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,595 [root] DEBUG: Loader: Injecting process 3424 (thread 3896) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,595 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,595 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,595 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,595 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3424
2020-03-24 10:13:47,611 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3424
2020-03-24 10:13:47,611 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,627 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,627 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,627 [root] DEBUG: Loader: Injecting process 3424 (thread 3896) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,627 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,627 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,627 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,627 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,627 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3424
2020-03-24 10:13:47,641 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3504
2020-03-24 10:13:47,641 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,641 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,641 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,641 [root] DEBUG: Loader: Injecting process 3504 (thread 3588) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,641 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,641 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,641 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,641 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,641 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3504
2020-03-24 10:13:47,657 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3504
2020-03-24 10:13:47,657 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,657 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,657 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,674 [root] DEBUG: Loader: Injecting process 3504 (thread 3588) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,674 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,674 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,674 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,674 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,674 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3504
2020-03-24 10:13:47,688 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4156
2020-03-24 10:13:47,688 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,688 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,688 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,688 [root] DEBUG: Loader: Injecting process 4156 (thread 4160) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,688 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,688 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,688 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,688 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,688 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4156
2020-03-24 10:13:47,704 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4156
2020-03-24 10:13:47,704 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,704 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,704 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,704 [root] DEBUG: Loader: Injecting process 4156 (thread 4160) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,704 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,704 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,704 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,704 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,704 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4156
2020-03-24 10:13:47,720 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4252
2020-03-24 10:13:47,720 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,720 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,720 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,720 [root] DEBUG: Loader: Injecting process 4252 (thread 4256) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,720 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,720 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,720 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,720 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4252
2020-03-24 10:13:47,736 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4252
2020-03-24 10:13:47,736 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,736 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,736 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,736 [root] DEBUG: Loader: Injecting process 4252 (thread 4256) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,736 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,736 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,736 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,736 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,736 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4252
2020-03-24 10:13:47,766 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4348
2020-03-24 10:13:47,766 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,766 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,766 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,766 [root] DEBUG: Loader: Injecting process 4348 (thread 4352) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,766 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,766 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,766 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,766 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,766 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4348
2020-03-24 10:13:47,782 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4348
2020-03-24 10:13:47,782 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,782 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,798 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,798 [root] DEBUG: Loader: Injecting process 4348 (thread 4352) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,798 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,798 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,798 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,798 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,798 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4348
2020-03-24 10:13:47,813 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4444
2020-03-24 10:13:47,813 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,813 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,813 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,813 [root] DEBUG: Loader: Injecting process 4444 (thread 4448) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,813 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,813 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,813 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,813 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,813 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4444
2020-03-24 10:13:47,829 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4444
2020-03-24 10:13:47,829 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,829 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,829 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,829 [root] DEBUG: Loader: Injecting process 4444 (thread 4448) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,845 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,845 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,845 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,845 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4444
2020-03-24 10:13:47,861 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4540
2020-03-24 10:13:47,861 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,861 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,861 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,861 [root] DEBUG: Loader: Injecting process 4540 (thread 4544) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,861 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,861 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,861 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,861 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,861 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4540
2020-03-24 10:13:47,875 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4540
2020-03-24 10:13:47,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,891 [root] DEBUG: Loader: Injecting process 4540 (thread 4544) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,891 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,891 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,891 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,891 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,891 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4540
2020-03-24 10:13:47,907 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4636
2020-03-24 10:13:47,907 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,907 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,907 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,907 [root] DEBUG: Loader: Injecting process 4636 (thread 4640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,907 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,907 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,907 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,907 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,923 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4636
2020-03-24 10:13:47,923 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4636
2020-03-24 10:13:47,923 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,923 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,938 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,938 [root] DEBUG: Loader: Injecting process 4636 (thread 4640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,938 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,938 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,938 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,938 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,938 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4636
2020-03-24 10:13:47,953 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4732
2020-03-24 10:13:47,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,953 [root] DEBUG: Loader: Injecting process 4732 (thread 4736) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,953 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,953 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4732
2020-03-24 10:13:47,970 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4732
2020-03-24 10:13:47,970 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,970 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:47,970 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:47,986 [root] DEBUG: Loader: Injecting process 4732 (thread 4736) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,986 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,986 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,986 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,986 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:47,986 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4732
2020-03-24 10:13:48,000 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4828
2020-03-24 10:13:48,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,000 [root] DEBUG: Loader: Injecting process 4828 (thread 4832) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,000 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,000 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4828
2020-03-24 10:13:48,016 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4828
2020-03-24 10:13:48,016 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,016 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,016 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,016 [root] DEBUG: Loader: Injecting process 4828 (thread 4832) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,016 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,016 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,016 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,032 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,032 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4828
2020-03-24 10:13:48,048 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4924
2020-03-24 10:13:48,048 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,048 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,048 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,048 [root] DEBUG: Loader: Injecting process 4924 (thread 4928) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,048 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,048 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,048 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,048 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,048 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4924
2020-03-24 10:13:48,063 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4924
2020-03-24 10:13:48,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,078 [root] DEBUG: Loader: Injecting process 4924 (thread 4928) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,078 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,078 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4924
2020-03-24 10:13:48,095 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5020
2020-03-24 10:13:48,095 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,095 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,095 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,095 [root] DEBUG: Loader: Injecting process 5020 (thread 5024) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,095 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,095 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,095 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,095 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,095 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5020
2020-03-24 10:13:48,109 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5020
2020-03-24 10:13:48,109 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,109 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,109 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,109 [root] DEBUG: Loader: Injecting process 5020 (thread 5024) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,109 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,109 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,125 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5020
2020-03-24 10:13:48,141 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5116
2020-03-24 10:13:48,141 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,141 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,141 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,141 [root] DEBUG: Loader: Injecting process 5116 (thread 3268) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,141 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,141 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,141 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,141 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,141 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5116
2020-03-24 10:13:48,157 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5116
2020-03-24 10:13:48,157 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,157 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,157 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,157 [root] DEBUG: Loader: Injecting process 5116 (thread 3268) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,157 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,157 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,157 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,173 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,173 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5116
2020-03-24 10:13:48,187 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4204
2020-03-24 10:13:48,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,187 [root] DEBUG: Loader: Injecting process 4204 (thread 4180) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,187 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,187 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4204
2020-03-24 10:13:48,203 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4204
2020-03-24 10:13:48,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,220 [root] DEBUG: Loader: Injecting process 4204 (thread 4180) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,220 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,220 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,220 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,220 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,220 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4204
2020-03-24 10:13:48,234 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4320
2020-03-24 10:13:48,234 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,234 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,234 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,234 [root] DEBUG: Loader: Injecting process 4320 (thread 4324) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,234 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,234 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,234 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,234 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,234 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4320
2020-03-24 10:13:48,250 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4320
2020-03-24 10:13:48,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,250 [root] DEBUG: Loader: Injecting process 4320 (thread 4324) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,250 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,250 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4320
2020-03-24 10:13:48,282 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4432
2020-03-24 10:13:48,282 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,282 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,282 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,282 [root] DEBUG: Loader: Injecting process 4432 (thread 4436) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,282 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,282 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,282 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,282 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,282 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4432
2020-03-24 10:13:48,298 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4432
2020-03-24 10:13:48,298 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,298 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,312 [root] DEBUG: Loader: Injecting process 4432 (thread 4436) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,312 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,312 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4432
2020-03-24 10:13:48,328 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4500
2020-03-24 10:13:48,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,328 [root] DEBUG: Loader: Injecting process 4500 (thread 4496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,328 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,328 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4500
2020-03-24 10:13:48,344 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4500
2020-03-24 10:13:48,344 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,344 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,344 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,344 [root] DEBUG: Loader: Injecting process 4500 (thread 4496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,344 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,344 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,344 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,344 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,344 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4500
2020-03-24 10:13:48,359 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4668
2020-03-24 10:13:48,359 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,359 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,359 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,359 [root] DEBUG: Loader: Injecting process 4668 (thread 4672) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,359 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,359 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,359 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,359 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,359 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4668
2020-03-24 10:13:48,375 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4668
2020-03-24 10:13:48,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,375 [root] DEBUG: Loader: Injecting process 4668 (thread 4672) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,375 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,375 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4668
2020-03-24 10:13:48,407 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4780
2020-03-24 10:13:48,407 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,407 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,407 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,407 [root] DEBUG: Loader: Injecting process 4780 (thread 4756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,407 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,407 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,407 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,407 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,407 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4780
2020-03-24 10:13:48,421 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4780
2020-03-24 10:13:48,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,437 [root] DEBUG: Loader: Injecting process 4780 (thread 4756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,437 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,437 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4780
2020-03-24 10:13:48,453 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4900
2020-03-24 10:13:48,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,453 [root] DEBUG: Loader: Injecting process 4900 (thread 4896) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,453 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,453 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4900
2020-03-24 10:13:48,469 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4900
2020-03-24 10:13:48,469 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,469 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,469 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,469 [root] DEBUG: Loader: Injecting process 4900 (thread 4896) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,469 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,469 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,484 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,484 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,484 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4900
2020-03-24 10:13:48,500 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5008
2020-03-24 10:13:48,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,500 [root] DEBUG: Loader: Injecting process 5008 (thread 5012) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,500 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,500 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5008
2020-03-24 10:13:48,516 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5008
2020-03-24 10:13:48,516 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,516 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,516 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,516 [root] DEBUG: Loader: Injecting process 5008 (thread 5012) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,516 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,516 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,516 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,516 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,516 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5008
2020-03-24 10:13:48,546 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5076
2020-03-24 10:13:48,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,546 [root] DEBUG: Loader: Injecting process 5076 (thread 5072) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,546 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,546 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5076
2020-03-24 10:13:48,562 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5076
2020-03-24 10:13:48,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,562 [root] DEBUG: Loader: Injecting process 5076 (thread 5072) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,562 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,578 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5076
2020-03-24 10:13:48,594 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4240
2020-03-24 10:13:48,594 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,594 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,594 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,594 [root] DEBUG: Loader: Injecting process 4240 (thread 4244) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,594 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,594 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,594 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,594 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,594 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4240
2020-03-24 10:13:48,609 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4240
2020-03-24 10:13:48,609 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,609 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,609 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,609 [root] DEBUG: Loader: Injecting process 4240 (thread 4244) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,609 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,609 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,609 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,609 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4240
2020-03-24 10:13:48,641 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4380
2020-03-24 10:13:48,641 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,641 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,641 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,641 [root] DEBUG: Loader: Injecting process 4380 (thread 4316) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,641 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,641 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,641 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,641 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,641 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4380
2020-03-24 10:13:48,655 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4380
2020-03-24 10:13:48,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,671 [root] DEBUG: Loader: Injecting process 4380 (thread 4316) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,671 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,671 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4380
2020-03-24 10:13:48,687 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4516
2020-03-24 10:13:48,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,687 [root] DEBUG: Loader: Injecting process 4516 (thread 4520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,687 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,687 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4516
2020-03-24 10:13:48,703 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4516
2020-03-24 10:13:48,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,703 [root] DEBUG: Loader: Injecting process 4516 (thread 4520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,703 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,719 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,719 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4516
2020-03-24 10:13:48,733 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4592
2020-03-24 10:13:48,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,733 [root] DEBUG: Loader: Injecting process 4592 (thread 4632) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,733 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,733 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4592
2020-03-24 10:13:48,750 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4592
2020-03-24 10:13:48,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,750 [root] DEBUG: Loader: Injecting process 4592 (thread 4632) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,750 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,766 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,766 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4592
2020-03-24 10:13:48,780 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4696
2020-03-24 10:13:48,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,780 [root] DEBUG: Loader: Injecting process 4696 (thread 4724) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,780 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,780 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4696
2020-03-24 10:13:48,796 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4696
2020-03-24 10:13:48,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,796 [root] DEBUG: Loader: Injecting process 4696 (thread 4724) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,796 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,812 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4696
2020-03-24 10:13:48,828 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4880
2020-03-24 10:13:48,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,828 [root] DEBUG: Loader: Injecting process 4880 (thread 4888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,828 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,828 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4880
2020-03-24 10:13:48,844 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4880
2020-03-24 10:13:48,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,858 [root] DEBUG: Loader: Injecting process 4880 (thread 4888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,858 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,858 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4880
2020-03-24 10:13:48,875 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5068
2020-03-24 10:13:48,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,875 [root] DEBUG: Loader: Injecting process 5068 (thread 5016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,875 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,875 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5068
2020-03-24 10:13:48,890 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5068
2020-03-24 10:13:48,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,890 [root] DEBUG: Loader: Injecting process 5068 (thread 5016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,890 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,890 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5068
2020-03-24 10:13:48,921 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4196
2020-03-24 10:13:48,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,921 [root] DEBUG: Loader: Injecting process 4196 (thread 4116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,921 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,921 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4196
2020-03-24 10:13:48,937 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4196
2020-03-24 10:13:48,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,937 [root] DEBUG: Loader: Injecting process 4196 (thread 4116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,937 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,953 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4196
2020-03-24 10:13:48,967 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4304
2020-03-24 10:13:48,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,967 [root] DEBUG: Loader: Injecting process 4304 (thread 4344) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,967 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,967 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4304
2020-03-24 10:13:48,983 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4304
2020-03-24 10:13:48,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:48,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:48,983 [root] DEBUG: Loader: Injecting process 4304 (thread 4344) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,983 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:48,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,983 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4304
2020-03-24 10:13:49,015 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4428
2020-03-24 10:13:49,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,015 [root] DEBUG: Loader: Injecting process 4428 (thread 4388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,015 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,015 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4428
2020-03-24 10:13:49,030 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4428
2020-03-24 10:13:49,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,030 [root] DEBUG: Loader: Injecting process 4428 (thread 4388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,030 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,030 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4428
2020-03-24 10:13:49,062 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4704
2020-03-24 10:13:49,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,062 [root] DEBUG: Loader: Injecting process 4704 (thread 4708) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,062 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,062 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4704
2020-03-24 10:13:49,078 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4704
2020-03-24 10:13:49,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,092 [root] DEBUG: Loader: Injecting process 4704 (thread 4708) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,092 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,108 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4704
2020-03-24 10:13:49,124 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4864
2020-03-24 10:13:49,124 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,124 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,124 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,124 [root] DEBUG: Loader: Injecting process 4864 (thread 4792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,124 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,124 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,124 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,124 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,124 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4864
2020-03-24 10:13:49,140 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4864
2020-03-24 10:13:49,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,140 [root] DEBUG: Loader: Injecting process 4864 (thread 4792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,140 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,155 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4864
2020-03-24 10:13:49,171 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4960
2020-03-24 10:13:49,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,171 [root] DEBUG: Loader: Injecting process 4960 (thread 5004) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,171 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,171 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4960
2020-03-24 10:13:49,187 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4960
2020-03-24 10:13:49,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,187 [root] DEBUG: Loader: Injecting process 4960 (thread 5004) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,187 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,201 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,201 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,201 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,201 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4960
2020-03-24 10:13:49,217 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4136
2020-03-24 10:13:49,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,217 [root] DEBUG: Loader: Injecting process 4136 (thread 4132) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,217 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,217 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4136
2020-03-24 10:13:49,233 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4136
2020-03-24 10:13:49,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,249 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,249 [root] DEBUG: Loader: Injecting process 4136 (thread 4132) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,249 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,249 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,249 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,249 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,249 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4136
2020-03-24 10:13:49,265 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4296
2020-03-24 10:13:49,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,265 [root] DEBUG: Loader: Injecting process 4296 (thread 4292) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,265 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,265 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,279 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4296
2020-03-24 10:13:49,279 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4296
2020-03-24 10:13:49,279 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,279 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,296 [root] DEBUG: Loader: Injecting process 4296 (thread 4292) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,296 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,296 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4296
2020-03-24 10:13:49,312 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4508
2020-03-24 10:13:49,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,312 [root] DEBUG: Loader: Injecting process 4508 (thread 4512) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,312 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,312 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4508
2020-03-24 10:13:49,326 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4508
2020-03-24 10:13:49,326 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,326 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,326 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,326 [root] DEBUG: Loader: Injecting process 4508 (thread 4512) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,326 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,326 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,326 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,342 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4508
2020-03-24 10:13:49,358 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4772
2020-03-24 10:13:49,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,358 [root] DEBUG: Loader: Injecting process 4772 (thread 4612) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,358 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,358 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4772
2020-03-24 10:13:49,374 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4772
2020-03-24 10:13:49,374 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,374 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,374 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,374 [root] DEBUG: Loader: Injecting process 4772 (thread 4612) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,374 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,374 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,374 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,390 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4772
2020-03-24 10:13:49,404 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4948
2020-03-24 10:13:49,404 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,404 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,404 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,404 [root] DEBUG: Loader: Injecting process 4948 (thread 4912) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,404 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,404 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,404 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,404 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,404 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4948
2020-03-24 10:13:49,421 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4948
2020-03-24 10:13:49,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,436 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,436 [root] DEBUG: Loader: Injecting process 4948 (thread 4912) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,436 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,436 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,436 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,436 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,436 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4948
2020-03-24 10:13:49,451 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4088
2020-03-24 10:13:49,451 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,451 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,451 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,451 [root] DEBUG: Loader: Injecting process 4088 (thread 4108) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,451 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,451 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,451 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,451 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,451 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4088
2020-03-24 10:13:49,467 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4088
2020-03-24 10:13:49,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,483 [root] DEBUG: Loader: Injecting process 4088 (thread 4108) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,483 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,483 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4088
2020-03-24 10:13:49,499 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4200
2020-03-24 10:13:49,499 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,499 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,499 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,499 [root] DEBUG: Loader: Injecting process 4200 (thread 4192) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,499 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,499 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,499 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,499 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,499 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4200
2020-03-24 10:13:49,513 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4200
2020-03-24 10:13:49,513 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,513 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,513 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,513 [root] DEBUG: Loader: Injecting process 4200 (thread 4192) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,513 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,513 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,513 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,529 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,529 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4200
2020-03-24 10:13:49,546 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4600
2020-03-24 10:13:49,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,546 [root] DEBUG: Loader: Injecting process 4600 (thread 4608) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,546 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,546 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4600
2020-03-24 10:13:49,561 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4600
2020-03-24 10:13:49,561 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,561 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,561 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,561 [root] DEBUG: Loader: Injecting process 4600 (thread 4608) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,561 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,561 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,576 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,576 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,576 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4600
2020-03-24 10:13:49,592 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4688
2020-03-24 10:13:49,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,592 [root] DEBUG: Loader: Injecting process 4688 (thread 4796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,592 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,592 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4688
2020-03-24 10:13:49,608 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4688
2020-03-24 10:13:49,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,608 [root] DEBUG: Loader: Injecting process 4688 (thread 4796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,608 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,608 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4688
2020-03-24 10:13:49,638 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5060
2020-03-24 10:13:49,638 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,638 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,638 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,638 [root] DEBUG: Loader: Injecting process 5060 (thread 4964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,638 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,638 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,638 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,638 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,638 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5060
2020-03-24 10:13:49,654 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5060
2020-03-24 10:13:49,654 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,654 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,654 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,654 [root] DEBUG: Loader: Injecting process 5060 (thread 4964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,670 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,670 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,670 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,670 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,670 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5060
2020-03-24 10:13:49,686 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4276
2020-03-24 10:13:49,686 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,686 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,686 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,686 [root] DEBUG: Loader: Injecting process 4276 (thread 4228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,686 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,686 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,686 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,686 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,686 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4276
2020-03-24 10:13:49,701 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4276
2020-03-24 10:13:49,701 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,701 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,701 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,701 [root] DEBUG: Loader: Injecting process 4276 (thread 4228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,701 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,701 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,717 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4276
2020-03-24 10:13:49,733 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4372
2020-03-24 10:13:49,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,733 [root] DEBUG: Loader: Injecting process 4372 (thread 4480) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,733 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,733 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4372
2020-03-24 10:13:49,747 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4372
2020-03-24 10:13:49,747 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,747 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,747 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,747 [root] DEBUG: Loader: Injecting process 4372 (thread 4480) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,747 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,747 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,747 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,763 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,763 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4372
2020-03-24 10:13:49,779 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4856
2020-03-24 10:13:49,779 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,779 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,779 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,779 [root] DEBUG: Loader: Injecting process 4856 (thread 4872) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,779 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,779 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,779 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,779 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,795 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4856
2020-03-24 10:13:49,795 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4856
2020-03-24 10:13:49,795 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,795 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,811 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,811 [root] DEBUG: Loader: Injecting process 4856 (thread 4872) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,811 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,811 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,811 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,811 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,811 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4856
2020-03-24 10:13:49,825 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4184
2020-03-24 10:13:49,825 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,825 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,825 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,825 [root] DEBUG: Loader: Injecting process 4184 (thread 5108) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,825 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,825 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,825 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,825 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,825 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4184
2020-03-24 10:13:49,842 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4184
2020-03-24 10:13:49,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,858 [root] DEBUG: Loader: Injecting process 4184 (thread 5108) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,858 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,858 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4184
2020-03-24 10:13:49,872 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4440
2020-03-24 10:13:49,872 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,872 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,872 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,872 [root] DEBUG: Loader: Injecting process 4440 (thread 4400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,872 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,872 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,872 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,872 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,872 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4440
2020-03-24 10:13:49,888 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4440
2020-03-24 10:13:49,888 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,888 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,888 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,888 [root] DEBUG: Loader: Injecting process 4440 (thread 4400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,888 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,888 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,888 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,888 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,888 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4440
2020-03-24 10:13:49,904 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4764
2020-03-24 10:13:49,904 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,904 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,904 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,904 [root] DEBUG: Loader: Injecting process 4764 (thread 4684) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,904 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,904 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,904 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,904 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,904 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4764
2020-03-24 10:13:49,920 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4764
2020-03-24 10:13:49,920 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,920 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,920 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,936 [root] DEBUG: Loader: Injecting process 4764 (thread 4684) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,936 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,936 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,936 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,936 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,936 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4764
2020-03-24 10:13:49,950 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4884
2020-03-24 10:13:49,950 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,950 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,950 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,950 [root] DEBUG: Loader: Injecting process 4884 (thread 4944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,950 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,950 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,950 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,950 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,950 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4884
2020-03-24 10:13:49,967 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4884
2020-03-24 10:13:49,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,982 [root] DEBUG: Loader: Injecting process 4884 (thread 4944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,982 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,982 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,982 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,982 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,982 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4884
2020-03-24 10:13:49,997 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4272
2020-03-24 10:13:49,997 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,997 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:49,997 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:49,997 [root] DEBUG: Loader: Injecting process 4272 (thread 4376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,997 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,997 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,997 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,997 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:49,997 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4272
2020-03-24 10:13:50,013 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4272
2020-03-24 10:13:50,013 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,013 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,013 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,013 [root] DEBUG: Loader: Injecting process 4272 (thread 4376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,013 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,029 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,029 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,029 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,029 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4272
2020-03-24 10:13:50,045 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4876
2020-03-24 10:13:50,045 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,045 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,045 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,045 [root] DEBUG: Loader: Injecting process 4876 (thread 4860) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,045 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,045 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,045 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,045 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,059 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4876
2020-03-24 10:13:50,059 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4876
2020-03-24 10:13:50,075 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,075 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,075 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,075 [root] DEBUG: Loader: Injecting process 4876 (thread 4860) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,075 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,075 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,075 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,075 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,075 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4876
2020-03-24 10:13:50,092 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4128
2020-03-24 10:13:50,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,092 [root] DEBUG: Loader: Injecting process 4128 (thread 4284) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,092 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,092 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4128
2020-03-24 10:13:50,107 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4128
2020-03-24 10:13:50,107 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,107 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,107 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,107 [root] DEBUG: Loader: Injecting process 4128 (thread 4284) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,107 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,107 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,107 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,138 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,138 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4128
2020-03-24 10:13:50,154 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4956
2020-03-24 10:13:50,154 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,154 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,154 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,154 [root] DEBUG: Loader: Injecting process 4956 (thread 4560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,154 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,154 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,154 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,154 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,154 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4956
2020-03-24 10:13:50,170 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4956
2020-03-24 10:13:50,170 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,170 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,170 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,170 [root] DEBUG: Loader: Injecting process 4956 (thread 4560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,170 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,170 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,170 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,170 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,170 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4956
2020-03-24 10:13:50,200 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4940
2020-03-24 10:13:50,200 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,200 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,200 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,200 [root] DEBUG: Loader: Injecting process 4940 (thread 4892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,200 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,200 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,200 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,200 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,200 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4940
2020-03-24 10:13:50,216 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4940
2020-03-24 10:13:50,216 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,216 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,232 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,232 [root] DEBUG: Loader: Injecting process 4940 (thread 4892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,232 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,232 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,232 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,232 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,232 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4940
2020-03-24 10:13:50,247 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3968
2020-03-24 10:13:50,247 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,247 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,247 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,247 [root] DEBUG: Loader: Injecting process 3968 (thread 4692) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,247 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,247 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,247 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,247 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,247 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3968
2020-03-24 10:13:50,263 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 3968
2020-03-24 10:13:50,263 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,263 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,263 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,263 [root] DEBUG: Loader: Injecting process 3968 (thread 4692) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,279 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,279 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,279 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,279 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,279 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3968
2020-03-24 10:13:50,293 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4364
2020-03-24 10:13:50,293 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,293 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,293 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,293 [root] DEBUG: Loader: Injecting process 4364 (thread 4384) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,293 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,293 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,293 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,293 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,293 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4364
2020-03-24 10:13:50,309 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4364
2020-03-24 10:13:50,309 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,309 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,309 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,309 [root] DEBUG: Loader: Injecting process 4364 (thread 4384) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,309 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,309 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,325 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,325 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,325 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4364
2020-03-24 10:13:50,341 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5064
2020-03-24 10:13:50,341 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,341 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,341 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,341 [root] DEBUG: Loader: Injecting process 5064 (thread 4288) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,341 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,341 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,341 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,341 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,341 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5064
2020-03-24 10:13:50,357 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5064
2020-03-24 10:13:50,357 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,357 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,357 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,357 [root] DEBUG: Loader: Injecting process 5064 (thread 4288) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,357 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,357 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,357 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,357 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,371 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5064
2020-03-24 10:13:50,388 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4224
2020-03-24 10:13:50,388 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,388 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,388 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,388 [root] DEBUG: Loader: Injecting process 4224 (thread 4628) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,388 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,388 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,388 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,388 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,388 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4224
2020-03-24 10:13:50,404 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4224
2020-03-24 10:13:50,404 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,404 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,418 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,418 [root] DEBUG: Loader: Injecting process 4224 (thread 4628) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,418 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,418 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,418 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,418 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,418 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4224
2020-03-24 10:13:50,434 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4760
2020-03-24 10:13:50,434 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,434 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,434 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,434 [root] DEBUG: Loader: Injecting process 4760 (thread 4868) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,434 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,434 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,434 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,434 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,434 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4760
2020-03-24 10:13:50,450 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4760
2020-03-24 10:13:50,450 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,450 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,466 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,466 [root] DEBUG: Loader: Injecting process 4760 (thread 4868) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,466 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,466 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,466 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,466 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,466 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4760
2020-03-24 10:13:50,482 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4616
2020-03-24 10:13:50,482 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,482 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,482 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,482 [root] DEBUG: Loader: Injecting process 4616 (thread 4848) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,482 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,482 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,482 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,482 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,482 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4616
2020-03-24 10:13:50,496 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4616
2020-03-24 10:13:50,496 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,496 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,496 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,496 [root] DEBUG: Loader: Injecting process 4616 (thread 4848) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,496 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,513 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,513 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,513 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,513 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4616
2020-03-24 10:13:50,528 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5044
2020-03-24 10:13:50,528 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,528 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,528 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,528 [root] DEBUG: Loader: Injecting process 5044 (thread 5084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,528 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,528 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,528 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,528 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,528 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5044
2020-03-24 10:13:50,543 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5044
2020-03-24 10:13:50,543 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,543 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,543 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,543 [root] DEBUG: Loader: Injecting process 5044 (thread 5084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,543 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,543 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,543 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,543 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,559 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5044
2020-03-24 10:13:50,575 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4804
2020-03-24 10:13:50,575 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,575 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,575 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,575 [root] DEBUG: Loader: Injecting process 4804 (thread 4424) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,575 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,575 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,575 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,575 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,575 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4804
2020-03-24 10:13:50,591 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 4804
2020-03-24 10:13:50,591 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,591 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,591 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,591 [root] DEBUG: Loader: Injecting process 4804 (thread 4424) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,591 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,591 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,605 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,605 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,605 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4804
2020-03-24 10:13:50,621 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5088
2020-03-24 10:13:50,621 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,621 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,621 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,621 [root] DEBUG: Loader: Injecting process 5088 (thread 4576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,621 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,621 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,621 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,621 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,621 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5088
2020-03-24 10:13:50,638 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5088
2020-03-24 10:13:50,638 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,638 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,638 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,638 [root] DEBUG: Loader: Injecting process 5088 (thread 4576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,638 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,638 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,638 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,638 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,638 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5088
2020-03-24 10:13:50,668 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5192
2020-03-24 10:13:50,668 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,668 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,668 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,668 [root] DEBUG: Loader: Injecting process 5192 (thread 5196) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,668 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,668 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,668 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,668 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,668 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5192
2020-03-24 10:13:50,684 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5192
2020-03-24 10:13:50,684 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,684 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,700 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,700 [root] DEBUG: Loader: Injecting process 5192 (thread 5196) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,700 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,700 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,700 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,700 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,700 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5192
2020-03-24 10:13:50,716 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5288
2020-03-24 10:13:50,716 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,716 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,716 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,716 [root] DEBUG: Loader: Injecting process 5288 (thread 5292) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,716 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,716 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,716 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,716 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,716 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5288
2020-03-24 10:13:50,730 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5288
2020-03-24 10:13:50,730 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,730 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,746 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,746 [root] DEBUG: Loader: Injecting process 5288 (thread 5292) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,746 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,746 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,746 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,746 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,746 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5288
2020-03-24 10:13:50,762 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5384
2020-03-24 10:13:50,762 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,762 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,762 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,762 [root] DEBUG: Loader: Injecting process 5384 (thread 5388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,762 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,762 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,762 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,762 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,762 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5384
2020-03-24 10:13:50,778 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5384
2020-03-24 10:13:50,778 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,778 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,793 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,793 [root] DEBUG: Loader: Injecting process 5384 (thread 5388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,793 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,793 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,793 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,793 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,793 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5384
2020-03-24 10:13:50,809 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5480
2020-03-24 10:13:50,809 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,809 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,809 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,809 [root] DEBUG: Loader: Injecting process 5480 (thread 5484) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,809 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,809 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,809 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,809 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,809 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5480
2020-03-24 10:13:50,825 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5480
2020-03-24 10:13:50,825 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,825 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,839 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,839 [root] DEBUG: Loader: Injecting process 5480 (thread 5484) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,839 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,839 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,839 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,839 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,839 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5480
2020-03-24 10:13:50,855 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5576
2020-03-24 10:13:50,855 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,855 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,855 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,855 [root] DEBUG: Loader: Injecting process 5576 (thread 5580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,855 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,855 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,855 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,855 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,855 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5576
2020-03-24 10:13:50,887 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5576
2020-03-24 10:13:50,887 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,887 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,887 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,887 [root] DEBUG: Loader: Injecting process 5576 (thread 5580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,887 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,887 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,887 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,887 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,887 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5576
2020-03-24 10:13:50,917 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5672
2020-03-24 10:13:50,917 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,917 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,917 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,917 [root] DEBUG: Loader: Injecting process 5672 (thread 5676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,917 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,917 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,917 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,917 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5672
2020-03-24 10:13:50,934 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5672
2020-03-24 10:13:50,934 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,934 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,934 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,934 [root] DEBUG: Loader: Injecting process 5672 (thread 5676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,934 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,934 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,934 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,934 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,950 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5672
2020-03-24 10:13:50,964 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5768
2020-03-24 10:13:50,964 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,964 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,964 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,964 [root] DEBUG: Loader: Injecting process 5768 (thread 5772) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,964 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,964 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,964 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,964 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,964 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5768
2020-03-24 10:13:50,980 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5768
2020-03-24 10:13:50,980 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,980 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:50,996 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:50,996 [root] DEBUG: Loader: Injecting process 5768 (thread 5772) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,996 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,996 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,996 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,996 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:50,996 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5768
2020-03-24 10:13:51,012 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5864
2020-03-24 10:13:51,012 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,012 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,012 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,012 [root] DEBUG: Loader: Injecting process 5864 (thread 5868) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,012 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,012 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,012 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,012 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,012 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5864
2020-03-24 10:13:51,028 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5864
2020-03-24 10:13:51,028 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,028 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,042 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,042 [root] DEBUG: Loader: Injecting process 5864 (thread 5868) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,042 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,042 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,042 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5864
2020-03-24 10:13:51,059 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5960
2020-03-24 10:13:51,059 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,059 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,059 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,059 [root] DEBUG: Loader: Injecting process 5960 (thread 5964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,059 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,059 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,059 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,059 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,059 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5960
2020-03-24 10:13:51,073 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5960
2020-03-24 10:13:51,073 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,073 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,073 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,089 [root] DEBUG: Loader: Injecting process 5960 (thread 5964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,089 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,089 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,089 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,089 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,089 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5960
2020-03-24 10:13:51,105 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6056
2020-03-24 10:13:51,105 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,105 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,105 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,105 [root] DEBUG: Loader: Injecting process 6056 (thread 6060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,105 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,105 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,105 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,105 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,105 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6056
2020-03-24 10:13:51,121 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6056
2020-03-24 10:13:51,121 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,121 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,137 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,137 [root] DEBUG: Loader: Injecting process 6056 (thread 6060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,137 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,137 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,137 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,137 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,137 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6056
2020-03-24 10:13:51,167 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5132
2020-03-24 10:13:51,167 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,167 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,167 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,167 [root] DEBUG: Loader: Injecting process 5132 (thread 5136) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,167 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,167 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,167 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,167 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,167 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5132
2020-03-24 10:13:51,184 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5132
2020-03-24 10:13:51,184 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,184 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,184 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,184 [root] DEBUG: Loader: Injecting process 5132 (thread 5136) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,198 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,198 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,198 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,198 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,198 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5132
2020-03-24 10:13:51,214 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5216
2020-03-24 10:13:51,214 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,214 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,214 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,214 [root] DEBUG: Loader: Injecting process 5216 (thread 5212) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,214 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,214 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,214 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,214 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,214 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5216
2020-03-24 10:13:51,230 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5216
2020-03-24 10:13:51,230 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,230 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,246 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,246 [root] DEBUG: Loader: Injecting process 5216 (thread 5212) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,246 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,246 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,246 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,246 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,246 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5216
2020-03-24 10:13:51,262 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5372
2020-03-24 10:13:51,262 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,262 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,262 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,262 [root] DEBUG: Loader: Injecting process 5372 (thread 5368) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,262 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,262 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,262 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,262 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,262 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5372
2020-03-24 10:13:51,276 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5372
2020-03-24 10:13:51,276 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,276 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,276 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,276 [root] DEBUG: Loader: Injecting process 5372 (thread 5368) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,276 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,276 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,276 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,276 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,292 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5372
2020-03-24 10:13:51,308 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5472
2020-03-24 10:13:51,308 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,308 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,308 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,308 [root] DEBUG: Loader: Injecting process 5472 (thread 5448) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,308 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,308 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,323 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,323 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,323 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5472
2020-03-24 10:13:51,339 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5472
2020-03-24 10:13:51,339 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,339 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,339 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,339 [root] DEBUG: Loader: Injecting process 5472 (thread 5448) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,339 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,339 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,339 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,339 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,339 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5472
2020-03-24 10:13:51,355 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5532
2020-03-24 10:13:51,355 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,355 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,355 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,355 [root] DEBUG: Loader: Injecting process 5532 (thread 5572) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,355 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,355 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,355 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,355 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,355 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5532
2020-03-24 10:13:51,371 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5532
2020-03-24 10:13:51,371 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,371 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,385 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,385 [root] DEBUG: Loader: Injecting process 5532 (thread 5572) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,385 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,385 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,385 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,385 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,385 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5532
2020-03-24 10:13:51,401 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5708
2020-03-24 10:13:51,401 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,401 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,401 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,401 [root] DEBUG: Loader: Injecting process 5708 (thread 5712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,401 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,401 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,401 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,401 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,401 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5708
2020-03-24 10:13:51,417 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5708
2020-03-24 10:13:51,417 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,417 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,433 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,433 [root] DEBUG: Loader: Injecting process 5708 (thread 5712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,433 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,433 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,433 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,433 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,433 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5708
2020-03-24 10:13:51,448 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5816
2020-03-24 10:13:51,448 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,448 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,448 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,448 [root] DEBUG: Loader: Injecting process 5816 (thread 5792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,448 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,448 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,448 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,448 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,448 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5816
2020-03-24 10:13:51,463 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5816
2020-03-24 10:13:51,463 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,463 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,463 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,463 [root] DEBUG: Loader: Injecting process 5816 (thread 5792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,480 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,480 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,480 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,480 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,480 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5816
2020-03-24 10:13:51,496 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5936
2020-03-24 10:13:51,496 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,496 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,496 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,496 [root] DEBUG: Loader: Injecting process 5936 (thread 5940) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,496 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,496 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,496 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,496 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,496 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5936
2020-03-24 10:13:51,526 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5936
2020-03-24 10:13:51,526 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,526 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,526 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,526 [root] DEBUG: Loader: Injecting process 5936 (thread 5940) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,526 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,526 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,526 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,526 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,526 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5936
2020-03-24 10:13:51,542 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6048
2020-03-24 10:13:51,542 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,542 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,542 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,542 [root] DEBUG: Loader: Injecting process 6048 (thread 6020) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,542 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,542 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,542 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,542 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,542 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6048
2020-03-24 10:13:51,558 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6048
2020-03-24 10:13:51,558 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,558 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,573 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,573 [root] DEBUG: Loader: Injecting process 6048 (thread 6020) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,573 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,573 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,573 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,573 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,573 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6048
2020-03-24 10:13:51,588 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6108
2020-03-24 10:13:51,588 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,588 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,588 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,588 [root] DEBUG: Loader: Injecting process 6108 (thread 5128) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,588 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,588 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,588 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,588 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,588 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6108
2020-03-24 10:13:51,605 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6108
2020-03-24 10:13:51,605 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,605 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,605 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,605 [root] DEBUG: Loader: Injecting process 6108 (thread 5128) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,605 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,605 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,619 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,619 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,619 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6108
2020-03-24 10:13:51,635 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5256
2020-03-24 10:13:51,635 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,635 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,635 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,635 [root] DEBUG: Loader: Injecting process 5256 (thread 5252) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,635 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,635 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,635 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,635 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,635 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5256
2020-03-24 10:13:51,651 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5256
2020-03-24 10:13:51,651 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,651 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,651 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,651 [root] DEBUG: Loader: Injecting process 5256 (thread 5252) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,651 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,651 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,667 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,667 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,667 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5256
2020-03-24 10:13:51,683 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5380
2020-03-24 10:13:51,683 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,683 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,683 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,683 [root] DEBUG: Loader: Injecting process 5380 (thread 5376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,683 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,683 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,683 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,683 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,683 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5380
2020-03-24 10:13:51,697 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5380
2020-03-24 10:13:51,697 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,697 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,697 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,697 [root] DEBUG: Loader: Injecting process 5380 (thread 5376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,713 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,713 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,713 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,713 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,713 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5380
2020-03-24 10:13:51,730 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5568
2020-03-24 10:13:51,730 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,730 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,730 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,730 [root] DEBUG: Loader: Injecting process 5568 (thread 5564) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,730 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,730 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,730 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,730 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,730 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5568
2020-03-24 10:13:51,744 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5568
2020-03-24 10:13:51,744 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,744 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,760 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,760 [root] DEBUG: Loader: Injecting process 5568 (thread 5564) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,760 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,760 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,760 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,760 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,760 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5568
2020-03-24 10:13:51,776 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5700
2020-03-24 10:13:51,776 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,776 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,776 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,776 [root] DEBUG: Loader: Injecting process 5700 (thread 5664) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,776 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,776 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,776 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,776 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,776 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5700
2020-03-24 10:13:51,792 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5700
2020-03-24 10:13:51,792 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,792 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,808 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,808 [root] DEBUG: Loader: Injecting process 5700 (thread 5664) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,808 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,808 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,808 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,808 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,808 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5700
2020-03-24 10:13:51,822 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5736
2020-03-24 10:13:51,822 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,822 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,822 [root] DEBUG: Loader: Injecting process 5736 (thread 5788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,822 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,822 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,822 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,822 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5736
2020-03-24 10:13:51,838 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5736
2020-03-24 10:13:51,838 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,838 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,838 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,838 [root] DEBUG: Loader: Injecting process 5736 (thread 5788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,838 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,854 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,854 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,854 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,854 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5736
2020-03-24 10:13:51,869 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5956
2020-03-24 10:13:51,869 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,869 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,869 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,869 [root] DEBUG: Loader: Injecting process 5956 (thread 5988) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,869 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,869 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,869 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,869 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,869 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5956
2020-03-24 10:13:51,885 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5956
2020-03-24 10:13:51,885 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,885 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,901 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,901 [root] DEBUG: Loader: Injecting process 5956 (thread 5988) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,901 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,901 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,901 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,901 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,901 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5956
2020-03-24 10:13:51,917 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6084
2020-03-24 10:13:51,917 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,917 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,917 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,917 [root] DEBUG: Loader: Injecting process 6084 (thread 6052) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,917 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,917 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,917 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,917 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6084
2020-03-24 10:13:51,931 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6084
2020-03-24 10:13:51,931 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,931 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,931 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,931 [root] DEBUG: Loader: Injecting process 6084 (thread 6052) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,931 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,931 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,931 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,947 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,947 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6084
2020-03-24 10:13:51,963 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5148
2020-03-24 10:13:51,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,963 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,963 [root] DEBUG: Loader: Injecting process 5148 (thread 5156) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,963 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,963 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,963 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,963 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,963 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5148
2020-03-24 10:13:51,979 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5148
2020-03-24 10:13:51,979 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,979 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:51,979 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:51,979 [root] DEBUG: Loader: Injecting process 5148 (thread 5156) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,979 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,979 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,979 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,994 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:51,994 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5148
2020-03-24 10:13:52,009 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5316
2020-03-24 10:13:52,009 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,009 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,009 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,009 [root] DEBUG: Loader: Injecting process 5316 (thread 5412) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,009 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,009 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,009 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,009 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,009 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5316
2020-03-24 10:13:52,026 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5316
2020-03-24 10:13:52,026 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,026 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,042 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,042 [root] DEBUG: Loader: Injecting process 5316 (thread 5412) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,042 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,042 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,042 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5316
2020-03-24 10:13:52,056 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5468
2020-03-24 10:13:52,056 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,056 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,056 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,056 [root] DEBUG: Loader: Injecting process 5468 (thread 5560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,056 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,056 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,056 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,056 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,056 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5468
2020-03-24 10:13:52,072 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5468
2020-03-24 10:13:52,072 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,072 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,072 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,072 [root] DEBUG: Loader: Injecting process 5468 (thread 5560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,072 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,088 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,088 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,088 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,088 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5468
2020-03-24 10:13:52,104 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5752
2020-03-24 10:13:52,104 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,104 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,104 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,104 [root] DEBUG: Loader: Injecting process 5752 (thread 5756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,104 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,104 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,104 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,104 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,104 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5752
2020-03-24 10:13:52,119 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5752
2020-03-24 10:13:52,119 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,119 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,134 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,134 [root] DEBUG: Loader: Injecting process 5752 (thread 5756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,134 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,134 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,134 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,134 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,134 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5752
2020-03-24 10:13:52,151 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5820
2020-03-24 10:13:52,151 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,151 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,151 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,151 [root] DEBUG: Loader: Injecting process 5820 (thread 5844) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,151 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,151 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,151 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,151 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,151 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5820
2020-03-24 10:13:52,165 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5820
2020-03-24 10:13:52,165 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,165 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,181 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,181 [root] DEBUG: Loader: Injecting process 5820 (thread 5844) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,197 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,197 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,197 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,197 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,197 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5820
2020-03-24 10:13:52,213 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6088
2020-03-24 10:13:52,213 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,213 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,213 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,213 [root] DEBUG: Loader: Injecting process 6088 (thread 6092) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,213 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,213 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,213 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,213 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,213 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6088
2020-03-24 10:13:52,229 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6088
2020-03-24 10:13:52,229 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,229 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,243 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,243 [root] DEBUG: Loader: Injecting process 6088 (thread 6092) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,243 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,243 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,243 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,243 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,243 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6088
2020-03-24 10:13:52,259 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5172
2020-03-24 10:13:52,259 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,259 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,259 [root] DEBUG: Loader: Injecting process 5172 (thread 4268) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,259 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,259 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5172
2020-03-24 10:13:52,276 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5172
2020-03-24 10:13:52,276 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,276 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,290 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,290 [root] DEBUG: Loader: Injecting process 5172 (thread 4268) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,290 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,290 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,290 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,290 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,290 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5172
2020-03-24 10:13:52,306 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5312
2020-03-24 10:13:52,306 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,306 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,306 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,306 [root] DEBUG: Loader: Injecting process 5312 (thread 5416) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,306 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,306 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,306 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,306 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,322 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5312
2020-03-24 10:13:52,322 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5312
2020-03-24 10:13:52,322 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,322 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,338 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,338 [root] DEBUG: Loader: Injecting process 5312 (thread 5416) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,338 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,338 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,338 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,338 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,338 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5312
2020-03-24 10:13:52,354 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5552
2020-03-24 10:13:52,354 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,354 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,354 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,354 [root] DEBUG: Loader: Injecting process 5552 (thread 5548) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,354 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,354 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,354 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,368 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,368 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5552
2020-03-24 10:13:52,384 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5552
2020-03-24 10:13:52,384 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,384 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,384 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,384 [root] DEBUG: Loader: Injecting process 5552 (thread 5548) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,384 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,384 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,384 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,384 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,384 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5552
2020-03-24 10:13:52,400 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5652
2020-03-24 10:13:52,400 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,400 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,400 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,400 [root] DEBUG: Loader: Injecting process 5652 (thread 5740) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,400 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,400 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,400 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,400 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,400 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5652
2020-03-24 10:13:52,415 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5652
2020-03-24 10:13:52,415 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,415 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,415 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,415 [root] DEBUG: Loader: Injecting process 5652 (thread 5740) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,415 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,431 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,431 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,431 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,431 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5652
2020-03-24 10:13:52,447 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6032
2020-03-24 10:13:52,447 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,447 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,447 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,447 [root] DEBUG: Loader: Injecting process 6032 (thread 6040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,447 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,447 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,447 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,447 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,447 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6032
2020-03-24 10:13:52,463 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6032
2020-03-24 10:13:52,463 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,463 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,463 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,463 [root] DEBUG: Loader: Injecting process 6032 (thread 6040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,477 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,477 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,477 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,477 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,477 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6032
2020-03-24 10:13:52,493 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5176
2020-03-24 10:13:52,493 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,493 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,493 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,493 [root] DEBUG: Loader: Injecting process 5176 (thread 6080) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,493 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,493 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,493 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5176
2020-03-24 10:13:52,509 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5176
2020-03-24 10:13:52,509 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,509 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,509 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,525 [root] DEBUG: Loader: Injecting process 5176 (thread 6080) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,525 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,525 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,525 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,525 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,525 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5176
2020-03-24 10:13:52,540 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5228
2020-03-24 10:13:52,540 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,540 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,540 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,540 [root] DEBUG: Loader: Injecting process 5228 (thread 5304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,540 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,540 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,540 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,540 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,540 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5228
2020-03-24 10:13:52,555 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5228
2020-03-24 10:13:52,555 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,555 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,555 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,572 [root] DEBUG: Loader: Injecting process 5228 (thread 5304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,572 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,572 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,572 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,572 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,572 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5228
2020-03-24 10:13:52,588 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5644
2020-03-24 10:13:52,588 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,588 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,588 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,588 [root] DEBUG: Loader: Injecting process 5644 (thread 5592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,588 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,588 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,588 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,588 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,588 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5644
2020-03-24 10:13:52,602 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5644
2020-03-24 10:13:52,602 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,602 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,618 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,618 [root] DEBUG: Loader: Injecting process 5644 (thread 5592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,618 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,618 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,618 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,618 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,618 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5644
2020-03-24 10:13:52,634 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5764
2020-03-24 10:13:52,634 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,634 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,634 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,634 [root] DEBUG: Loader: Injecting process 5764 (thread 5828) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,634 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,634 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,634 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,634 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,634 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5764
2020-03-24 10:13:52,650 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5764
2020-03-24 10:13:52,650 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,650 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,650 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,650 [root] DEBUG: Loader: Injecting process 5764 (thread 5828) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,650 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,665 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,665 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,665 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,665 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5764
2020-03-24 10:13:52,680 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6100
2020-03-24 10:13:52,680 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,680 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,680 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,680 [root] DEBUG: Loader: Injecting process 6100 (thread 6136) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,680 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,680 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,680 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,680 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,680 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6100
2020-03-24 10:13:52,697 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6100
2020-03-24 10:13:52,697 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,697 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,697 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,697 [root] DEBUG: Loader: Injecting process 6100 (thread 6136) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,697 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,697 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,697 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,697 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,711 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6100
2020-03-24 10:13:52,727 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5264
2020-03-24 10:13:52,727 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,727 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,727 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,727 [root] DEBUG: Loader: Injecting process 5264 (thread 5340) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,727 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,727 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,727 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,727 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,727 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5264
2020-03-24 10:13:52,743 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5264
2020-03-24 10:13:52,743 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,743 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,743 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,743 [root] DEBUG: Loader: Injecting process 5264 (thread 5340) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,743 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,759 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,759 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,759 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,759 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5264
2020-03-24 10:13:52,775 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5464
2020-03-24 10:13:52,775 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,775 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,775 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,775 [root] DEBUG: Loader: Injecting process 5464 (thread 5620) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,775 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,775 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,775 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,775 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,775 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5464
2020-03-24 10:13:52,789 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5464
2020-03-24 10:13:52,789 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,789 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,789 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,789 [root] DEBUG: Loader: Injecting process 5464 (thread 5620) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,805 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,805 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,805 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,805 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,805 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5464
2020-03-24 10:13:52,822 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5920
2020-03-24 10:13:52,822 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,822 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,822 [root] DEBUG: Loader: Injecting process 5920 (thread 5888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,822 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,822 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,822 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,822 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5920
2020-03-24 10:13:52,836 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5920
2020-03-24 10:13:52,836 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,836 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,836 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,836 [root] DEBUG: Loader: Injecting process 5920 (thread 5888) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,852 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,852 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,852 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,852 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,852 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5920
2020-03-24 10:13:52,868 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6004
2020-03-24 10:13:52,868 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,868 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,868 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,868 [root] DEBUG: Loader: Injecting process 6004 (thread 6128) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,868 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,868 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,868 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,868 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,868 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6004
2020-03-24 10:13:52,884 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6004
2020-03-24 10:13:52,884 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,884 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,884 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,884 [root] DEBUG: Loader: Injecting process 6004 (thread 6128) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,884 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,900 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,900 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,900 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,900 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6004
2020-03-24 10:13:52,914 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5476
2020-03-24 10:13:52,914 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,914 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,914 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,914 [root] DEBUG: Loader: Injecting process 5476 (thread 5596) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,914 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,914 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,914 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,914 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,914 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5476
2020-03-24 10:13:52,930 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5476
2020-03-24 10:13:52,930 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,930 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,946 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,946 [root] DEBUG: Loader: Injecting process 5476 (thread 5596) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,946 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,946 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,946 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,946 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,946 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5476
2020-03-24 10:13:52,961 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5896
2020-03-24 10:13:52,961 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,961 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,961 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,961 [root] DEBUG: Loader: Injecting process 5896 (thread 5796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,961 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,961 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,961 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,961 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,961 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5896
2020-03-24 10:13:52,977 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5896
2020-03-24 10:13:52,977 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,977 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:52,993 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:52,993 [root] DEBUG: Loader: Injecting process 5896 (thread 5796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,993 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,993 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,993 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,993 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:52,993 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5896
2020-03-24 10:13:53,009 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6044
2020-03-24 10:13:53,009 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,009 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,009 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,009 [root] DEBUG: Loader: Injecting process 6044 (thread 5332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,009 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,009 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,009 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,009 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,009 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6044
2020-03-24 10:13:53,023 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6044
2020-03-24 10:13:53,023 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,023 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,023 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,023 [root] DEBUG: Loader: Injecting process 6044 (thread 5332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,039 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,039 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,039 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,039 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,039 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6044
2020-03-24 10:13:53,055 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5460
2020-03-24 10:13:53,055 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,055 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,055 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,055 [root] DEBUG: Loader: Injecting process 5460 (thread 5748) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,055 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,055 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,055 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,055 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,055 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5460
2020-03-24 10:13:53,071 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5460
2020-03-24 10:13:53,071 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,071 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,086 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,086 [root] DEBUG: Loader: Injecting process 5460 (thread 5748) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,086 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,086 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,086 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,086 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,086 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5460
2020-03-24 10:13:53,101 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5984
2020-03-24 10:13:53,101 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,101 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,101 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,101 [root] DEBUG: Loader: Injecting process 5984 (thread 5892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,101 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,101 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,101 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,101 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,101 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5984
2020-03-24 10:13:53,118 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5984
2020-03-24 10:13:53,118 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,118 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,118 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,118 [root] DEBUG: Loader: Injecting process 5984 (thread 5892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,118 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,134 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,134 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,134 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,134 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5984
2020-03-24 10:13:53,148 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5432
2020-03-24 10:13:53,148 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,148 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,148 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,148 [root] DEBUG: Loader: Injecting process 5432 (thread 5508) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,148 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,148 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,148 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,148 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,148 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5432
2020-03-24 10:13:53,164 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5432
2020-03-24 10:13:53,164 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,164 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,164 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,164 [root] DEBUG: Loader: Injecting process 5432 (thread 5508) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,180 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,180 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,180 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,180 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,180 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5432
2020-03-24 10:13:53,196 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5924
2020-03-24 10:13:53,196 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,196 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,196 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,196 [root] DEBUG: Loader: Injecting process 5924 (thread 5556) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,196 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,196 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,196 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,226 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5924
2020-03-24 10:13:53,243 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5924
2020-03-24 10:13:53,243 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,243 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,257 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,257 [root] DEBUG: Loader: Injecting process 5924 (thread 5556) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,257 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,257 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,257 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,257 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,257 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5924
2020-03-24 10:13:53,273 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5916
2020-03-24 10:13:53,273 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,273 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,273 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,273 [root] DEBUG: Loader: Injecting process 5916 (thread 5452) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,273 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,273 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,273 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,273 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,289 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5916
2020-03-24 10:13:53,305 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5916
2020-03-24 10:13:53,305 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,305 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,305 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,305 [root] DEBUG: Loader: Injecting process 5916 (thread 5452) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,305 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,305 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,305 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,305 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,305 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5916
2020-03-24 10:13:53,321 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5860
2020-03-24 10:13:53,321 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,321 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,321 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,321 [root] DEBUG: Loader: Injecting process 5860 (thread 5980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,335 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,335 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,335 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,335 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,335 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5860
2020-03-24 10:13:53,351 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5860
2020-03-24 10:13:53,351 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,351 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,351 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,351 [root] DEBUG: Loader: Injecting process 5860 (thread 5980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,351 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,351 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,351 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,351 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,351 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5860
2020-03-24 10:13:53,368 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5636
2020-03-24 10:13:53,368 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,368 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,368 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,368 [root] DEBUG: Loader: Injecting process 5636 (thread 5520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,368 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,368 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,368 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,368 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,368 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5636
2020-03-24 10:13:53,382 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5636
2020-03-24 10:13:53,382 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,382 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,382 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,382 [root] DEBUG: Loader: Injecting process 5636 (thread 5520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,398 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,398 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,398 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,398 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,398 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5636
2020-03-24 10:13:53,414 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5328
2020-03-24 10:13:53,414 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,414 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,414 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,414 [root] DEBUG: Loader: Injecting process 5328 (thread 5336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,414 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,414 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,414 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,414 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,414 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5328
2020-03-24 10:13:53,430 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5328
2020-03-24 10:13:53,430 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,430 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,430 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,430 [root] DEBUG: Loader: Injecting process 5328 (thread 5336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,430 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,430 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,430 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,430 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,446 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5328
2020-03-24 10:13:53,460 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5812
2020-03-24 10:13:53,460 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,460 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,460 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,460 [root] DEBUG: Loader: Injecting process 5812 (thread 5912) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,460 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,460 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,460 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,460 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,476 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5812
2020-03-24 10:13:53,476 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5812
2020-03-24 10:13:53,476 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,476 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,492 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,492 [root] DEBUG: Loader: Injecting process 5812 (thread 5912) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,492 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,492 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,492 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,492 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,492 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5812
2020-03-24 10:13:53,507 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6028
2020-03-24 10:13:53,507 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,507 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,507 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,507 [root] DEBUG: Loader: Injecting process 6028 (thread 6000) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,507 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,507 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,507 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,507 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,507 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6028
2020-03-24 10:13:53,523 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6028
2020-03-24 10:13:53,523 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,523 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,523 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,523 [root] DEBUG: Loader: Injecting process 6028 (thread 6000) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,523 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,523 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,539 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,539 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,539 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6028
2020-03-24 10:13:53,555 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5516
2020-03-24 10:13:53,555 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,555 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,555 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,555 [root] DEBUG: Loader: Injecting process 5516 (thread 6008) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,555 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,555 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,555 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,555 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,555 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5516
2020-03-24 10:13:53,569 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5516
2020-03-24 10:13:53,569 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,569 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,569 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,569 [root] DEBUG: Loader: Injecting process 5516 (thread 6008) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,569 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,585 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,585 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,585 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,585 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5516
2020-03-24 10:13:53,601 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5424
2020-03-24 10:13:53,601 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,601 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,601 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,601 [root] DEBUG: Loader: Injecting process 5424 (thread 5640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,601 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,601 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,601 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,601 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,601 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5424
2020-03-24 10:13:53,617 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5424
2020-03-24 10:13:53,617 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,617 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,617 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,617 [root] DEBUG: Loader: Injecting process 5424 (thread 5640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,617 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,617 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,617 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,632 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,632 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5424
2020-03-24 10:13:53,648 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5428
2020-03-24 10:13:53,648 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,648 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,648 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,648 [root] DEBUG: Loader: Injecting process 5428 (thread 5356) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,648 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,648 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,648 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,648 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,648 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5428
2020-03-24 10:13:53,664 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5428
2020-03-24 10:13:53,664 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,664 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,680 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,680 [root] DEBUG: Loader: Injecting process 5428 (thread 5356) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,680 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,680 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,680 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,680 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,680 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5428
2020-03-24 10:13:53,694 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5976
2020-03-24 10:13:53,694 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,694 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,694 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,694 [root] DEBUG: Loader: Injecting process 5976 (thread 5528) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,694 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,694 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,694 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,694 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,694 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5976
2020-03-24 10:13:53,710 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 5976
2020-03-24 10:13:53,710 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,710 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,726 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,726 [root] DEBUG: Loader: Injecting process 5976 (thread 5528) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,726 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,726 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,726 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,726 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,726 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5976
2020-03-24 10:13:53,742 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6216
2020-03-24 10:13:53,742 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,742 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,742 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,742 [root] DEBUG: Loader: Injecting process 6216 (thread 6220) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,742 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,742 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,742 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,742 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,757 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6216
2020-03-24 10:13:53,773 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6216
2020-03-24 10:13:53,773 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,773 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,773 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,773 [root] DEBUG: Loader: Injecting process 6216 (thread 6220) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,773 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,773 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,773 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,773 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,773 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6216
2020-03-24 10:13:53,789 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6312
2020-03-24 10:13:53,789 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,789 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,789 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,789 [root] DEBUG: Loader: Injecting process 6312 (thread 6316) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,789 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,789 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,789 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,789 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,789 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6312
2020-03-24 10:13:53,803 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6312
2020-03-24 10:13:53,803 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,803 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,803 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,819 [root] DEBUG: Loader: Injecting process 6312 (thread 6316) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,819 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,819 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,819 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,819 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,819 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6312
2020-03-24 10:13:53,835 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6408
2020-03-24 10:13:53,835 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,835 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,835 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,835 [root] DEBUG: Loader: Injecting process 6408 (thread 6412) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,835 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,835 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,835 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,835 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,835 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6408
2020-03-24 10:13:53,851 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6408
2020-03-24 10:13:53,851 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,851 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,851 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,851 [root] DEBUG: Loader: Injecting process 6408 (thread 6412) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,867 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,867 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,867 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,867 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,867 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6408
2020-03-24 10:13:53,881 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6504
2020-03-24 10:13:53,881 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,881 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,881 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,881 [root] DEBUG: Loader: Injecting process 6504 (thread 6508) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,881 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,881 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,881 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,881 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,881 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6504
2020-03-24 10:13:53,898 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6504
2020-03-24 10:13:53,898 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,898 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,898 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,914 [root] DEBUG: Loader: Injecting process 6504 (thread 6508) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,914 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,914 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,914 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,914 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,914 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6504
2020-03-24 10:13:53,928 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6600
2020-03-24 10:13:53,928 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,928 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,928 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,928 [root] DEBUG: Loader: Injecting process 6600 (thread 6604) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,928 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,928 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,928 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,928 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,944 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6600
2020-03-24 10:13:53,944 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6600
2020-03-24 10:13:53,960 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,960 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,960 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,976 [root] DEBUG: Loader: Injecting process 6600 (thread 6604) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,976 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,976 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,976 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,976 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,976 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6600
2020-03-24 10:13:53,992 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6696
2020-03-24 10:13:53,992 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,992 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:53,992 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:53,992 [root] DEBUG: Loader: Injecting process 6696 (thread 6700) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,992 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,992 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:53,992 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,992 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,006 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6696
2020-03-24 10:13:54,023 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6696
2020-03-24 10:13:54,023 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,023 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,023 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,023 [root] DEBUG: Loader: Injecting process 6696 (thread 6700) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,023 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,023 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,023 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,023 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,023 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6696
2020-03-24 10:13:54,038 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6792
2020-03-24 10:13:54,038 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,038 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,038 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,038 [root] DEBUG: Loader: Injecting process 6792 (thread 6796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,038 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,038 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,038 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,038 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,038 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6792
2020-03-24 10:13:54,053 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6792
2020-03-24 10:13:54,053 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,053 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,069 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,069 [root] DEBUG: Loader: Injecting process 6792 (thread 6796) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,069 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,069 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,069 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,069 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,069 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6792
2020-03-24 10:13:54,085 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6888
2020-03-24 10:13:54,085 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,085 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,085 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,085 [root] DEBUG: Loader: Injecting process 6888 (thread 6892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,085 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,085 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,085 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,085 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,085 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6888
2020-03-24 10:13:54,101 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6888
2020-03-24 10:13:54,101 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,101 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,115 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,115 [root] DEBUG: Loader: Injecting process 6888 (thread 6892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,115 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,115 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,115 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,115 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,115 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6888
2020-03-24 10:13:54,131 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6984
2020-03-24 10:13:54,131 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,131 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,131 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,131 [root] DEBUG: Loader: Injecting process 6984 (thread 6988) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,131 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,131 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,131 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,131 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,131 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6984
2020-03-24 10:13:54,148 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6984
2020-03-24 10:13:54,148 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,148 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,148 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,148 [root] DEBUG: Loader: Injecting process 6984 (thread 6988) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,148 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,163 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,163 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,163 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,163 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6984
2020-03-24 10:13:54,178 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7080
2020-03-24 10:13:54,178 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,178 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,178 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,178 [root] DEBUG: Loader: Injecting process 7080 (thread 7084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,178 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,178 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,178 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,178 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,194 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7080
2020-03-24 10:13:54,194 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7080
2020-03-24 10:13:54,194 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,210 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,210 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,210 [root] DEBUG: Loader: Injecting process 7080 (thread 7084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,210 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,210 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,210 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,210 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,210 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7080
2020-03-24 10:13:54,226 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6156
2020-03-24 10:13:54,226 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,226 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,226 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,226 [root] DEBUG: Loader: Injecting process 6156 (thread 6164) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,226 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,226 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,226 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,226 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6156
2020-03-24 10:13:54,256 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6156
2020-03-24 10:13:54,256 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,256 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,256 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,256 [root] DEBUG: Loader: Injecting process 6156 (thread 6164) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,256 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,256 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,256 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,256 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,256 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6156
2020-03-24 10:13:54,272 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6236
2020-03-24 10:13:54,272 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,272 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,272 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,272 [root] DEBUG: Loader: Injecting process 6236 (thread 6240) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,272 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,272 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,272 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,272 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,288 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6236
2020-03-24 10:13:54,288 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6236
2020-03-24 10:13:54,288 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,288 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,303 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,303 [root] DEBUG: Loader: Injecting process 6236 (thread 6240) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,303 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,303 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,303 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,303 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,303 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6236
2020-03-24 10:13:54,319 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6384
2020-03-24 10:13:54,319 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,319 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,319 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,319 [root] DEBUG: Loader: Injecting process 6384 (thread 6388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,319 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,319 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,319 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,319 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,319 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6384
2020-03-24 10:13:54,335 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6384
2020-03-24 10:13:54,335 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,335 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,335 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,335 [root] DEBUG: Loader: Injecting process 6384 (thread 6388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,335 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,335 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,335 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,335 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,349 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6384
2020-03-24 10:13:54,365 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6496
2020-03-24 10:13:54,365 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,365 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,365 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,365 [root] DEBUG: Loader: Injecting process 6496 (thread 6472) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,365 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,365 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,365 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,365 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,365 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6496
2020-03-24 10:13:54,381 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6496
2020-03-24 10:13:54,381 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,381 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,397 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,397 [root] DEBUG: Loader: Injecting process 6496 (thread 6472) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,397 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,397 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,397 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,397 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,397 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6496
2020-03-24 10:13:54,413 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6556
2020-03-24 10:13:54,413 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,413 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,413 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,413 [root] DEBUG: Loader: Injecting process 6556 (thread 6596) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,413 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,413 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,413 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,413 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,413 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6556
2020-03-24 10:13:54,427 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6556
2020-03-24 10:13:54,427 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,427 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,427 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,427 [root] DEBUG: Loader: Injecting process 6556 (thread 6596) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,427 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,444 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,444 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,444 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,444 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6556
2020-03-24 10:13:54,460 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6732
2020-03-24 10:13:54,460 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,460 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,460 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,460 [root] DEBUG: Loader: Injecting process 6732 (thread 6736) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,460 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,460 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,460 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,460 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,460 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6732
2020-03-24 10:13:54,474 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6732
2020-03-24 10:13:54,474 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,474 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,490 [root] DEBUG: Loader: Injecting process 6732 (thread 6736) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,490 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,490 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,490 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,490 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,490 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6732
2020-03-24 10:13:54,506 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6816
2020-03-24 10:13:54,506 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,506 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,506 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,506 [root] DEBUG: Loader: Injecting process 6816 (thread 6812) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,506 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,506 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,506 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,506 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,506 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-03-24 10:13:54,538 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6816
2020-03-24 10:13:54,538 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,538 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,538 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,538 [root] DEBUG: Loader: Injecting process 6816 (thread 6812) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,538 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,538 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,538 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,538 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,552 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-03-24 10:13:54,569 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6960
2020-03-24 10:13:54,569 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,569 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,569 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,569 [root] DEBUG: Loader: Injecting process 6960 (thread 6964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,569 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,569 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,569 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,569 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,569 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6960
2020-03-24 10:13:54,584 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6960
2020-03-24 10:13:54,584 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,584 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,599 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,599 [root] DEBUG: Loader: Injecting process 6960 (thread 6964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,599 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,599 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,599 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,599 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,599 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6960
2020-03-24 10:13:54,615 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7072
2020-03-24 10:13:54,615 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,615 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,615 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,615 [root] DEBUG: Loader: Injecting process 7072 (thread 7044) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,615 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,615 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,615 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,615 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,615 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7072
2020-03-24 10:13:54,631 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7072
2020-03-24 10:13:54,631 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,631 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,647 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,647 [root] DEBUG: Loader: Injecting process 7072 (thread 7044) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,647 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,647 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,647 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,647 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,647 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7072
2020-03-24 10:13:54,661 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7132
2020-03-24 10:13:54,661 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,661 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,661 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,661 [root] DEBUG: Loader: Injecting process 7132 (thread 6148) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,661 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,661 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,661 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,661 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,661 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7132
2020-03-24 10:13:54,677 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7132
2020-03-24 10:13:54,677 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,677 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,694 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,694 [root] DEBUG: Loader: Injecting process 7132 (thread 6148) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,694 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,694 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,694 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,694 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,694 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7132
2020-03-24 10:13:54,709 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6280
2020-03-24 10:13:54,709 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,709 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,709 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,709 [root] DEBUG: Loader: Injecting process 6280 (thread 6276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,709 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,709 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,724 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,724 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,724 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6280
2020-03-24 10:13:54,740 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6280
2020-03-24 10:13:54,740 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,740 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,740 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,740 [root] DEBUG: Loader: Injecting process 6280 (thread 6276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,740 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,740 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,740 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,740 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,756 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6280
2020-03-24 10:13:54,772 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6372
2020-03-24 10:13:54,772 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,772 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,772 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,772 [root] DEBUG: Loader: Injecting process 6372 (thread 6376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,772 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,772 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,772 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,772 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,772 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6372
2020-03-24 10:13:54,786 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6372
2020-03-24 10:13:54,786 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,786 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,786 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,802 [root] DEBUG: Loader: Injecting process 6372 (thread 6376) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,802 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,802 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,802 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,802 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,802 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6372
2020-03-24 10:13:54,818 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6584
2020-03-24 10:13:54,818 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,818 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,818 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,818 [root] DEBUG: Loader: Injecting process 6584 (thread 6588) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,818 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,818 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,818 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,818 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,818 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6584
2020-03-24 10:13:54,834 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6584
2020-03-24 10:13:54,834 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,834 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,849 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,849 [root] DEBUG: Loader: Injecting process 6584 (thread 6588) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,849 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,849 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,849 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,849 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,849 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6584
2020-03-24 10:13:54,865 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6724
2020-03-24 10:13:54,865 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,865 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,865 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,865 [root] DEBUG: Loader: Injecting process 6724 (thread 6660) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,865 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,865 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,865 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,865 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,881 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6724
2020-03-24 10:13:54,881 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6724
2020-03-24 10:13:54,881 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,881 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,895 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,895 [root] DEBUG: Loader: Injecting process 6724 (thread 6660) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,895 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,895 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,895 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,895 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,895 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6724
2020-03-24 10:13:54,911 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6760
2020-03-24 10:13:54,911 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,911 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,911 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,911 [root] DEBUG: Loader: Injecting process 6760 (thread 6840) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,911 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,911 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,911 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,911 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,911 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6760
2020-03-24 10:13:54,927 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6760
2020-03-24 10:13:54,927 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,927 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,943 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,943 [root] DEBUG: Loader: Injecting process 6760 (thread 6840) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,943 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,943 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,943 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,943 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,943 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6760
2020-03-24 10:13:54,959 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6980
2020-03-24 10:13:54,959 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,959 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,959 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,959 [root] DEBUG: Loader: Injecting process 6980 (thread 7012) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,959 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,959 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,959 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,959 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,959 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6980
2020-03-24 10:13:54,973 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6980
2020-03-24 10:13:54,973 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,973 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:54,990 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:54,990 [root] DEBUG: Loader: Injecting process 6980 (thread 7012) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,990 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,990 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,990 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,990 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:54,990 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6980
2020-03-24 10:13:55,006 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7108
2020-03-24 10:13:55,006 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,006 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,006 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,006 [root] DEBUG: Loader: Injecting process 7108 (thread 7076) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,006 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,006 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,006 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,006 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,006 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7108
2020-03-24 10:13:55,020 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7108
2020-03-24 10:13:55,020 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,020 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,020 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,020 [root] DEBUG: Loader: Injecting process 7108 (thread 7076) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,020 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,020 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,020 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,020 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,036 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7108
2020-03-24 10:13:55,052 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6300
2020-03-24 10:13:55,052 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,052 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,052 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,052 [root] DEBUG: Loader: Injecting process 6300 (thread 6260) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,052 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,052 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,052 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,052 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,052 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6300
2020-03-24 10:13:55,068 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6300
2020-03-24 10:13:55,068 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,068 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,068 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,068 [root] DEBUG: Loader: Injecting process 6300 (thread 6260) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,068 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,068 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,068 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,068 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,084 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6300
2020-03-24 10:13:55,098 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6404
2020-03-24 10:13:55,098 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,098 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,098 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,098 [root] DEBUG: Loader: Injecting process 6404 (thread 6364) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,098 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,098 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,098 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,098 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,098 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6404
2020-03-24 10:13:55,115 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6404
2020-03-24 10:13:55,115 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,115 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,115 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,115 [root] DEBUG: Loader: Injecting process 6404 (thread 6364) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,115 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,115 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,115 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,115 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,115 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6404
2020-03-24 10:13:55,145 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6492
2020-03-24 10:13:55,145 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,145 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,145 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,145 [root] DEBUG: Loader: Injecting process 6492 (thread 6580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,145 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,145 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,145 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,145 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,145 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6492
2020-03-24 10:13:55,161 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6492
2020-03-24 10:13:55,161 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,161 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,161 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,161 [root] DEBUG: Loader: Injecting process 6492 (thread 6580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,161 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,177 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,177 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,177 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,177 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6492
2020-03-24 10:13:55,193 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6780
2020-03-24 10:13:55,193 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,193 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,193 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,193 [root] DEBUG: Loader: Injecting process 6780 (thread 6776) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,193 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,193 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,193 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,193 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,193 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6780
2020-03-24 10:13:55,207 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6780
2020-03-24 10:13:55,207 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,207 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,207 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,223 [root] DEBUG: Loader: Injecting process 6780 (thread 6776) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,223 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,223 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,223 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,223 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,223 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6780
2020-03-24 10:13:55,240 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6852
2020-03-24 10:13:55,240 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,240 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,240 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,240 [root] DEBUG: Loader: Injecting process 6852 (thread 6848) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,240 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,240 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,240 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,240 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,240 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6852
2020-03-24 10:13:55,255 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6852
2020-03-24 10:13:55,255 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,255 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,286 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,286 [root] DEBUG: Loader: Injecting process 6852 (thread 6848) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,286 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,286 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,286 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,286 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,286 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6852
2020-03-24 10:13:55,302 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7120
2020-03-24 10:13:55,302 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,302 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,302 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,302 [root] DEBUG: Loader: Injecting process 7120 (thread 7116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,302 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,302 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,302 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,302 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,302 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7120
2020-03-24 10:13:55,318 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7120
2020-03-24 10:13:55,318 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,318 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,332 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,332 [root] DEBUG: Loader: Injecting process 7120 (thread 7116) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,332 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,332 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,332 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,332 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,332 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7120
2020-03-24 10:13:55,348 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6196
2020-03-24 10:13:55,348 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,348 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,348 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,348 [root] DEBUG: Loader: Injecting process 6196 (thread 5724) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,348 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,348 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,348 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,348 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,348 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6196
2020-03-24 10:13:55,364 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6196
2020-03-24 10:13:55,364 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,364 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,380 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,380 [root] DEBUG: Loader: Injecting process 6196 (thread 5724) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,380 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,380 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,380 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,380 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,380 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6196
2020-03-24 10:13:55,395 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6288
2020-03-24 10:13:55,395 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,395 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,395 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,395 [root] DEBUG: Loader: Injecting process 6288 (thread 6332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,395 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,395 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,395 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,411 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,411 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6288
2020-03-24 10:13:55,427 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6288
2020-03-24 10:13:55,427 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,427 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,427 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,427 [root] DEBUG: Loader: Injecting process 6288 (thread 6332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,427 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,427 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,427 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,427 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,427 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6288
2020-03-24 10:13:55,441 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6620
2020-03-24 10:13:55,441 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,441 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,441 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,441 [root] DEBUG: Loader: Injecting process 6620 (thread 6564) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,441 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,441 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,441 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,457 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,457 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6620
2020-03-24 10:13:55,473 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6620
2020-03-24 10:13:55,473 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,473 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,473 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,473 [root] DEBUG: Loader: Injecting process 6620 (thread 6564) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,473 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,473 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,473 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,473 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,473 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6620
2020-03-24 10:13:55,489 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6676
2020-03-24 10:13:55,489 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,489 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,489 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,489 [root] DEBUG: Loader: Injecting process 6676 (thread 6728) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,489 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,489 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,489 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,489 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,489 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6676
2020-03-24 10:13:55,505 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6676
2020-03-24 10:13:55,505 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,505 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,519 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,519 [root] DEBUG: Loader: Injecting process 6676 (thread 6728) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,519 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,519 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,519 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,519 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,519 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6676
2020-03-24 10:13:55,536 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7064
2020-03-24 10:13:55,536 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,536 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,536 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,536 [root] DEBUG: Loader: Injecting process 7064 (thread 6952) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,536 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,536 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,536 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,536 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,552 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7064
2020-03-24 10:13:55,552 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7064
2020-03-24 10:13:55,552 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,552 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,566 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,566 [root] DEBUG: Loader: Injecting process 7064 (thread 6952) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,566 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,566 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,566 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,566 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,566 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7064
2020-03-24 10:13:55,582 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6200
2020-03-24 10:13:55,582 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,582 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,582 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,582 [root] DEBUG: Loader: Injecting process 6200 (thread 6152) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,582 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,582 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,582 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,582 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,582 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6200
2020-03-24 10:13:55,598 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6200
2020-03-24 10:13:55,598 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,598 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,598 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,598 [root] DEBUG: Loader: Injecting process 6200 (thread 6152) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,598 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,614 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,614 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,614 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,614 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6200
2020-03-24 10:13:55,630 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6256
2020-03-24 10:13:55,630 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,630 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,630 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,630 [root] DEBUG: Loader: Injecting process 6256 (thread 6336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,630 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,630 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,630 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,630 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,630 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6256
2020-03-24 10:13:55,644 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6256
2020-03-24 10:13:55,644 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,644 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,644 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,644 [root] DEBUG: Loader: Injecting process 6256 (thread 6336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,661 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,661 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,661 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,661 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,661 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6256
2020-03-24 10:13:55,676 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6672
2020-03-24 10:13:55,676 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,676 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,676 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,676 [root] DEBUG: Loader: Injecting process 6672 (thread 6668) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,676 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,676 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,676 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,676 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,691 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6672
2020-03-24 10:13:55,707 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6672
2020-03-24 10:13:55,707 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,707 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,707 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,707 [root] DEBUG: Loader: Injecting process 6672 (thread 6668) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,707 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,707 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,707 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,707 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,707 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6672
2020-03-24 10:13:55,723 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6868
2020-03-24 10:13:55,723 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,723 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,723 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,723 [root] DEBUG: Loader: Injecting process 6868 (thread 6872) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,723 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,723 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,723 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,723 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,723 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6868
2020-03-24 10:13:55,739 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6868
2020-03-24 10:13:55,739 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,739 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,753 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,753 [root] DEBUG: Loader: Injecting process 6868 (thread 6872) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,753 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,753 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,753 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,753 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,753 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6868
2020-03-24 10:13:55,769 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7100
2020-03-24 10:13:55,769 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,769 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,769 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,769 [root] DEBUG: Loader: Injecting process 7100 (thread 7164) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,769 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,769 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,769 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,769 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,769 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7100
2020-03-24 10:13:55,786 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7100
2020-03-24 10:13:55,786 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,786 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,801 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,801 [root] DEBUG: Loader: Injecting process 7100 (thread 7164) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,801 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,801 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,801 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,816 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,816 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7100
2020-03-24 10:13:55,832 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6292
2020-03-24 10:13:55,832 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,832 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,832 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,832 [root] DEBUG: Loader: Injecting process 6292 (thread 6368) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,832 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,832 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,832 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,832 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,832 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6292
2020-03-24 10:13:55,848 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6292
2020-03-24 10:13:55,848 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,848 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,864 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,864 [root] DEBUG: Loader: Injecting process 6292 (thread 6368) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,864 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,864 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,864 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,864 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,864 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6292
2020-03-24 10:13:55,878 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6428
2020-03-24 10:13:55,878 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,878 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,878 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,878 [root] DEBUG: Loader: Injecting process 6428 (thread 6640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,878 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,878 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,878 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,878 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,878 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6428
2020-03-24 10:13:55,894 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6428
2020-03-24 10:13:55,894 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,894 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,894 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,910 [root] DEBUG: Loader: Injecting process 6428 (thread 6640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,910 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,910 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,910 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,910 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,910 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6428
2020-03-24 10:13:55,926 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6884
2020-03-24 10:13:55,926 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,926 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,926 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,926 [root] DEBUG: Loader: Injecting process 6884 (thread 6956) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,926 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,926 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,926 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,926 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,926 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6884
2020-03-24 10:13:55,941 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6884
2020-03-24 10:13:55,941 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,941 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,941 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,957 [root] DEBUG: Loader: Injecting process 6884 (thread 6956) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,957 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,957 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,957 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,957 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,957 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6884
2020-03-24 10:13:55,973 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6356
2020-03-24 10:13:55,973 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,973 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:55,973 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:55,973 [root] DEBUG: Loader: Injecting process 6356 (thread 7024) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,973 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,973 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,973 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,973 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:55,973 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6356
2020-03-24 10:13:55,987 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6356
2020-03-24 10:13:55,987 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,987 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,003 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,003 [root] DEBUG: Loader: Injecting process 6356 (thread 7024) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,003 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,003 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,003 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,003 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,003 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6356
2020-03-24 10:13:56,019 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6500
2020-03-24 10:13:56,019 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,019 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,019 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,019 [root] DEBUG: Loader: Injecting process 6500 (thread 6576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,019 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,019 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,019 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,019 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,019 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6500
2020-03-24 10:13:56,035 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6500
2020-03-24 10:13:56,035 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,035 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,035 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,035 [root] DEBUG: Loader: Injecting process 6500 (thread 6576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,051 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,051 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,051 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,051 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,051 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6500
2020-03-24 10:13:56,065 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6920
2020-03-24 10:13:56,065 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,065 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,065 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,065 [root] DEBUG: Loader: Injecting process 6920 (thread 6788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,065 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,065 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,065 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,065 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,065 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6920
2020-03-24 10:13:56,082 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6920
2020-03-24 10:13:56,082 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,082 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,098 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,098 [root] DEBUG: Loader: Injecting process 6920 (thread 6788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,098 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,098 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,098 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,098 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,098 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6920
2020-03-24 10:13:56,112 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6948
2020-03-24 10:13:56,112 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,112 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,112 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,112 [root] DEBUG: Loader: Injecting process 6948 (thread 6212) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,112 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,112 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,112 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,112 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,112 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6948
2020-03-24 10:13:56,128 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6948
2020-03-24 10:13:56,128 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,128 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,128 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,128 [root] DEBUG: Loader: Injecting process 6948 (thread 6212) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,128 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,144 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,144 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,144 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,144 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6948
2020-03-24 10:13:56,160 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6748
2020-03-24 10:13:56,160 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,160 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,160 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,160 [root] DEBUG: Loader: Injecting process 6748 (thread 6836) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,160 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,160 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,160 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,160 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,160 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6748
2020-03-24 10:13:56,176 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6748
2020-03-24 10:13:56,176 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,176 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,176 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,176 [root] DEBUG: Loader: Injecting process 6748 (thread 6836) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,176 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,176 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,176 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,176 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,190 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6748
2020-03-24 10:13:56,207 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7032
2020-03-24 10:13:56,207 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,207 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,207 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,207 [root] DEBUG: Loader: Injecting process 7032 (thread 6916) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,207 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,207 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,207 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,207 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,207 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7032
2020-03-24 10:13:56,221 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7032
2020-03-24 10:13:56,221 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,221 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,237 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,237 [root] DEBUG: Loader: Injecting process 7032 (thread 6916) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,237 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,237 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,237 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,237 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,237 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7032
2020-03-24 10:13:56,253 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6476
2020-03-24 10:13:56,253 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,253 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,253 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,253 [root] DEBUG: Loader: Injecting process 6476 (thread 6452) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,253 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,253 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,253 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,253 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,253 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6476
2020-03-24 10:13:56,269 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6476
2020-03-24 10:13:56,269 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,269 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,285 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,285 [root] DEBUG: Loader: Injecting process 6476 (thread 6452) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,285 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,285 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,285 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,285 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,285 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6476
2020-03-24 10:13:56,315 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6940
2020-03-24 10:13:56,315 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,315 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,315 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,315 [root] DEBUG: Loader: Injecting process 6940 (thread 6528) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,315 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,315 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,315 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,315 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,315 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6940
2020-03-24 10:13:56,332 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6940
2020-03-24 10:13:56,332 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,332 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,332 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,332 [root] DEBUG: Loader: Injecting process 6940 (thread 6528) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,332 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,332 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,332 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,332 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,346 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6940
2020-03-24 10:13:56,362 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7068
2020-03-24 10:13:56,362 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,362 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,362 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,362 [root] DEBUG: Loader: Injecting process 7068 (thread 6348) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,362 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,362 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,362 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,362 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,362 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7068
2020-03-24 10:13:56,378 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7068
2020-03-24 10:13:56,378 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,378 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,378 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,378 [root] DEBUG: Loader: Injecting process 7068 (thread 6348) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,394 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,394 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,394 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,394 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,394 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7068
2020-03-24 10:13:56,410 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7028
2020-03-24 10:13:56,410 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,410 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,410 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,410 [root] DEBUG: Loader: Injecting process 7028 (thread 6944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,410 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,410 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,410 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,410 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,410 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7028
2020-03-24 10:13:56,424 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7028
2020-03-24 10:13:56,424 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,424 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,424 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,424 [root] DEBUG: Loader: Injecting process 7028 (thread 6944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,424 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,424 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,424 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,424 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,440 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7028
2020-03-24 10:13:56,456 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6828
2020-03-24 10:13:56,456 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,456 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,456 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,456 [root] DEBUG: Loader: Injecting process 6828 (thread 6832) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,456 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,456 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,456 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,456 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,456 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6828
2020-03-24 10:13:56,471 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6828
2020-03-24 10:13:56,471 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,471 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,471 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,471 [root] DEBUG: Loader: Injecting process 6828 (thread 6832) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,471 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,471 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,471 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,487 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,487 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6828
2020-03-24 10:13:56,503 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6652
2020-03-24 10:13:56,503 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,503 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,503 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,503 [root] DEBUG: Loader: Injecting process 6652 (thread 6524) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,503 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,503 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,503 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,503 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,503 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6652
2020-03-24 10:13:56,519 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6652
2020-03-24 10:13:56,519 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,519 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,519 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,533 [root] DEBUG: Loader: Injecting process 6652 (thread 6524) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,533 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,533 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,533 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,533 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,533 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6652
2020-03-24 10:13:56,549 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7004
2020-03-24 10:13:56,549 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,549 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,549 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,549 [root] DEBUG: Loader: Injecting process 7004 (thread 6248) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,549 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,549 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,549 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,549 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,549 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7004
2020-03-24 10:13:56,565 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7004
2020-03-24 10:13:56,565 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,565 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,565 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,565 [root] DEBUG: Loader: Injecting process 7004 (thread 6248) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,565 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,581 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,581 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,581 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,581 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7004
2020-03-24 10:13:56,596 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7124
2020-03-24 10:13:56,596 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,596 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,596 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,596 [root] DEBUG: Loader: Injecting process 7124 (thread 6936) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,596 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,596 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,596 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,596 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,596 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7124
2020-03-24 10:13:56,611 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7124
2020-03-24 10:13:56,611 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,611 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,611 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,611 [root] DEBUG: Loader: Injecting process 7124 (thread 6936) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,611 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,628 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,628 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,628 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,628 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7124
2020-03-24 10:13:56,644 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6360
2020-03-24 10:13:56,644 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,644 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,644 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,644 [root] DEBUG: Loader: Injecting process 6360 (thread 7140) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,644 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,644 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,644 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,644 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,658 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6360
2020-03-24 10:13:56,674 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6360
2020-03-24 10:13:56,674 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,674 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,674 [root] DEBUG: Loader: Injecting process 6360 (thread 7140) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,674 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,674 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,674 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,674 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,690 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6360
2020-03-24 10:13:56,706 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7056
2020-03-24 10:13:56,706 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,706 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,706 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,706 [root] DEBUG: Loader: Injecting process 7056 (thread 7000) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,706 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,706 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,706 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,706 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,706 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7056
2020-03-24 10:13:56,721 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7056
2020-03-24 10:13:56,721 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,721 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,721 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,721 [root] DEBUG: Loader: Injecting process 7056 (thread 7000) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,721 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,721 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,736 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,736 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,736 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7056
2020-03-24 10:13:56,753 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6656
2020-03-24 10:13:56,753 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,753 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,753 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,753 [root] DEBUG: Loader: Injecting process 6656 (thread 6820) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,753 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,753 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,753 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,753 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,753 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6656
2020-03-24 10:13:56,767 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6656
2020-03-24 10:13:56,767 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,767 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,783 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,783 [root] DEBUG: Loader: Injecting process 6656 (thread 6820) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,783 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,783 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,783 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,783 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,783 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6656
2020-03-24 10:13:56,799 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6544
2020-03-24 10:13:56,799 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,799 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,799 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,799 [root] DEBUG: Loader: Injecting process 6544 (thread 6624) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,799 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,799 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,799 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,799 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,799 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6544
2020-03-24 10:13:56,815 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 6544
2020-03-24 10:13:56,815 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,815 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,815 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,815 [root] DEBUG: Loader: Injecting process 6544 (thread 6624) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,831 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,831 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,831 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,831 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,831 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6544
2020-03-24 10:13:56,845 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7244
2020-03-24 10:13:56,845 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,845 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,845 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,845 [root] DEBUG: Loader: Injecting process 7244 (thread 7248) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,845 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,845 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,845 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,845 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7244
2020-03-24 10:13:56,861 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7244
2020-03-24 10:13:56,861 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,861 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,861 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,861 [root] DEBUG: Loader: Injecting process 7244 (thread 7248) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,861 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,878 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,878 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,878 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,878 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7244
2020-03-24 10:13:56,892 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7340
2020-03-24 10:13:56,892 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,892 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,892 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,892 [root] DEBUG: Loader: Injecting process 7340 (thread 7344) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,892 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,892 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,892 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,892 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,892 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7340
2020-03-24 10:13:56,908 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7340
2020-03-24 10:13:56,908 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,908 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,908 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,908 [root] DEBUG: Loader: Injecting process 7340 (thread 7344) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,908 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,908 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,924 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,924 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,924 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7340
2020-03-24 10:13:56,940 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7436
2020-03-24 10:13:56,940 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,940 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,940 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,940 [root] DEBUG: Loader: Injecting process 7436 (thread 7440) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,940 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,940 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,940 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,940 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,940 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7436
2020-03-24 10:13:56,956 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7436
2020-03-24 10:13:56,956 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,956 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,956 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,970 [root] DEBUG: Loader: Injecting process 7436 (thread 7440) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,970 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,970 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,970 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,970 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,970 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7436
2020-03-24 10:13:56,986 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7532
2020-03-24 10:13:56,986 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,986 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:56,986 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:56,986 [root] DEBUG: Loader: Injecting process 7532 (thread 7536) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,986 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,986 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,986 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,986 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:56,986 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7532
2020-03-24 10:13:57,002 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7532
2020-03-24 10:13:57,002 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,002 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,017 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,017 [root] DEBUG: Loader: Injecting process 7532 (thread 7536) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,017 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,017 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,017 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,017 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,017 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7532
2020-03-24 10:13:57,033 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7628
2020-03-24 10:13:57,033 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,033 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,033 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,033 [root] DEBUG: Loader: Injecting process 7628 (thread 7632) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,033 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,033 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,033 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,033 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,033 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7628
2020-03-24 10:13:57,049 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7628
2020-03-24 10:13:57,049 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,049 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,049 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,065 [root] DEBUG: Loader: Injecting process 7628 (thread 7632) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,065 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,065 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,065 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,065 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,065 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7628
2020-03-24 10:13:57,079 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7724
2020-03-24 10:13:57,079 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,079 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,079 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,079 [root] DEBUG: Loader: Injecting process 7724 (thread 7728) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,079 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,079 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,079 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,079 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,079 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7724
2020-03-24 10:13:57,095 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7724
2020-03-24 10:13:57,095 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,095 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,095 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,095 [root] DEBUG: Loader: Injecting process 7724 (thread 7728) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,095 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,111 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,111 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,111 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,111 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7724
2020-03-24 10:13:57,127 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7820
2020-03-24 10:13:57,127 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,127 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,127 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,127 [root] DEBUG: Loader: Injecting process 7820 (thread 7824) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,127 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,127 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,127 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,127 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,127 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7820
2020-03-24 10:13:57,142 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7820
2020-03-24 10:13:57,142 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,142 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,142 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,142 [root] DEBUG: Loader: Injecting process 7820 (thread 7824) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,142 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,157 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,157 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,157 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,157 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7820
2020-03-24 10:13:57,174 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7916
2020-03-24 10:13:57,174 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,174 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,174 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,174 [root] DEBUG: Loader: Injecting process 7916 (thread 7920) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,190 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,190 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,190 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,190 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,190 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7916
2020-03-24 10:13:57,204 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7916
2020-03-24 10:13:57,204 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,204 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,204 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,204 [root] DEBUG: Loader: Injecting process 7916 (thread 7920) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,204 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,204 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,204 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,204 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,204 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7916
2020-03-24 10:13:57,220 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8012
2020-03-24 10:13:57,220 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,220 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,220 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,220 [root] DEBUG: Loader: Injecting process 8012 (thread 8016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,220 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,220 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,220 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,220 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,220 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8012
2020-03-24 10:13:57,236 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8012
2020-03-24 10:13:57,236 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,236 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,236 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,236 [root] DEBUG: Loader: Injecting process 8012 (thread 8016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,252 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,252 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,252 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,252 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,252 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8012
2020-03-24 10:13:57,267 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8108
2020-03-24 10:13:57,267 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,267 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,267 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,267 [root] DEBUG: Loader: Injecting process 8108 (thread 8112) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,267 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,267 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,267 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,267 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,267 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8108
2020-03-24 10:13:57,282 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8108
2020-03-24 10:13:57,282 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,282 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,299 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,299 [root] DEBUG: Loader: Injecting process 8108 (thread 8112) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,299 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,299 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,299 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,299 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,299 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8108
2020-03-24 10:13:57,313 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7188
2020-03-24 10:13:57,313 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,313 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,313 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,313 [root] DEBUG: Loader: Injecting process 7188 (thread 7192) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,313 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,313 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,313 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,313 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,329 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7188
2020-03-24 10:13:57,345 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7188
2020-03-24 10:13:57,345 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,345 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,361 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,361 [root] DEBUG: Loader: Injecting process 7188 (thread 7192) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,361 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,361 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,361 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,361 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,361 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7188
2020-03-24 10:13:57,377 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7268
2020-03-24 10:13:57,377 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,377 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,377 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,377 [root] DEBUG: Loader: Injecting process 7268 (thread 7260) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,377 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,377 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,377 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,377 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,377 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7268
2020-03-24 10:13:57,391 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7268
2020-03-24 10:13:57,391 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,391 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,407 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,407 [root] DEBUG: Loader: Injecting process 7268 (thread 7260) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,407 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,407 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,407 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,407 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,407 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7268
2020-03-24 10:13:57,424 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7416
2020-03-24 10:13:57,424 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,424 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,424 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,424 [root] DEBUG: Loader: Injecting process 7416 (thread 7420) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,424 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,424 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,424 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,424 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,424 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7416
2020-03-24 10:13:57,438 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7416
2020-03-24 10:13:57,438 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,438 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,454 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,454 [root] DEBUG: Loader: Injecting process 7416 (thread 7420) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,454 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,454 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,454 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,454 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,454 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7416
2020-03-24 10:13:57,470 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7500
2020-03-24 10:13:57,470 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,470 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,470 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,470 [root] DEBUG: Loader: Injecting process 7500 (thread 7496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,470 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,470 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,470 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,470 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,470 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7500
2020-03-24 10:13:57,486 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7500
2020-03-24 10:13:57,486 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,486 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,486 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,502 [root] DEBUG: Loader: Injecting process 7500 (thread 7496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,502 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,502 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,502 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,502 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,502 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7500
2020-03-24 10:13:57,516 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7624
2020-03-24 10:13:57,516 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,516 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,516 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,516 [root] DEBUG: Loader: Injecting process 7624 (thread 7656) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,516 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,516 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,516 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,516 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,516 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7624
2020-03-24 10:13:57,532 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7624
2020-03-24 10:13:57,532 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,532 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,532 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,548 [root] DEBUG: Loader: Injecting process 7624 (thread 7656) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,548 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,548 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,548 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,548 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,548 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7624
2020-03-24 10:13:57,563 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7764
2020-03-24 10:13:57,563 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,563 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,563 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,563 [root] DEBUG: Loader: Injecting process 7764 (thread 7768) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,563 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,563 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,563 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,563 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,563 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7764
2020-03-24 10:13:57,579 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7764
2020-03-24 10:13:57,579 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,579 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,579 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,579 [root] DEBUG: Loader: Injecting process 7764 (thread 7768) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,579 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,595 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,595 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,595 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,595 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7764
2020-03-24 10:13:57,611 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7844
2020-03-24 10:13:57,611 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,611 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,611 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,611 [root] DEBUG: Loader: Injecting process 7844 (thread 7836) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,611 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,611 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,611 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,611 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7844
2020-03-24 10:13:57,625 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7844
2020-03-24 10:13:57,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,641 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,641 [root] DEBUG: Loader: Injecting process 7844 (thread 7836) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,641 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,641 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,641 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,641 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,641 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7844
2020-03-24 10:13:57,657 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7992
2020-03-24 10:13:57,657 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,657 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,657 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,657 [root] DEBUG: Loader: Injecting process 7992 (thread 7996) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,657 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,657 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,657 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,657 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,657 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-03-24 10:13:57,673 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7992
2020-03-24 10:13:57,673 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,673 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,688 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,688 [root] DEBUG: Loader: Injecting process 7992 (thread 7996) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,688 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,688 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,688 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,688 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,688 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-03-24 10:13:57,703 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8076
2020-03-24 10:13:57,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,703 [root] DEBUG: Loader: Injecting process 8076 (thread 8072) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,703 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,703 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8076
2020-03-24 10:13:57,720 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8076
2020-03-24 10:13:57,720 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,720 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,736 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,736 [root] DEBUG: Loader: Injecting process 8076 (thread 8072) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,736 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,736 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,736 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,736 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,736 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8076
2020-03-24 10:13:57,750 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7184
2020-03-24 10:13:57,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,750 [root] DEBUG: Loader: Injecting process 7184 (thread 7220) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,750 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,750 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,766 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-03-24 10:13:57,782 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7184
2020-03-24 10:13:57,782 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,782 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,782 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,782 [root] DEBUG: Loader: Injecting process 7184 (thread 7220) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,782 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,782 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,782 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,782 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,782 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-03-24 10:13:57,798 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7300
2020-03-24 10:13:57,798 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,798 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,798 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,798 [root] DEBUG: Loader: Injecting process 7300 (thread 7296) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,798 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,798 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,798 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,798 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,813 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7300
2020-03-24 10:13:57,813 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7300
2020-03-24 10:13:57,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,828 [root] DEBUG: Loader: Injecting process 7300 (thread 7296) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,828 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,828 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7300
2020-03-24 10:13:57,845 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7404
2020-03-24 10:13:57,845 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,845 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,845 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,845 [root] DEBUG: Loader: Injecting process 7404 (thread 7428) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,845 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,845 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,845 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,845 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7404
2020-03-24 10:13:57,859 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7404
2020-03-24 10:13:57,859 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,859 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,875 [root] DEBUG: Loader: Injecting process 7404 (thread 7428) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,875 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,875 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7404
2020-03-24 10:13:57,891 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7596
2020-03-24 10:13:57,891 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,891 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,891 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,891 [root] DEBUG: Loader: Injecting process 7596 (thread 7592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,891 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,891 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,891 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,891 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,891 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7596
2020-03-24 10:13:57,907 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7596
2020-03-24 10:13:57,907 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,907 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,923 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,923 [root] DEBUG: Loader: Injecting process 7596 (thread 7592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,923 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,923 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,923 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,923 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,923 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7596
2020-03-24 10:13:57,937 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7692
2020-03-24 10:13:57,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,937 [root] DEBUG: Loader: Injecting process 7692 (thread 7716) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,937 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,937 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7692
2020-03-24 10:13:57,953 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7692
2020-03-24 10:13:57,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,970 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,970 [root] DEBUG: Loader: Injecting process 7692 (thread 7716) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,970 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,970 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,970 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,970 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:57,970 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7692
2020-03-24 10:13:57,984 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7840
2020-03-24 10:13:57,984 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,984 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:57,984 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:57,984 [root] DEBUG: Loader: Injecting process 7840 (thread 7880) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,000 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,000 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7840
2020-03-24 10:13:58,016 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7840
2020-03-24 10:13:58,016 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,016 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,016 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,016 [root] DEBUG: Loader: Injecting process 7840 (thread 7880) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,016 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,016 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,016 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,016 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,016 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7840
2020-03-24 10:13:58,032 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8044
2020-03-24 10:13:58,032 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,032 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,032 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,032 [root] DEBUG: Loader: Injecting process 8044 (thread 8048) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,032 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,032 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,032 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,032 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,032 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8044
2020-03-24 10:13:58,062 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8044
2020-03-24 10:13:58,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,062 [root] DEBUG: Loader: Injecting process 8044 (thread 8048) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,062 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,062 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8044
2020-03-24 10:13:58,078 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8136
2020-03-24 10:13:58,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,078 [root] DEBUG: Loader: Injecting process 8136 (thread 8104) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,078 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,078 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,094 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8136
2020-03-24 10:13:58,109 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8136
2020-03-24 10:13:58,109 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,109 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,109 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,109 [root] DEBUG: Loader: Injecting process 8136 (thread 8104) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,109 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,109 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,109 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,109 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,109 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8136
2020-03-24 10:13:58,125 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7208
2020-03-24 10:13:58,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,125 [root] DEBUG: Loader: Injecting process 7208 (thread 7276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,125 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,125 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7208
2020-03-24 10:13:58,141 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7208
2020-03-24 10:13:58,141 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,141 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,157 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,157 [root] DEBUG: Loader: Injecting process 7208 (thread 7276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,157 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,157 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,157 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,157 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,157 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7208
2020-03-24 10:13:58,171 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7412
2020-03-24 10:13:58,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,171 [root] DEBUG: Loader: Injecting process 7412 (thread 7368) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,171 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,171 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7412
2020-03-24 10:13:58,187 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7412
2020-03-24 10:13:58,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,203 [root] DEBUG: Loader: Injecting process 7412 (thread 7368) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,203 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,203 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7412
2020-03-24 10:13:58,219 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7620
2020-03-24 10:13:58,219 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,219 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,219 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,219 [root] DEBUG: Loader: Injecting process 7620 (thread 7548) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,219 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,219 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,219 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,219 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,219 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7620
2020-03-24 10:13:58,234 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7620
2020-03-24 10:13:58,234 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,234 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,250 [root] DEBUG: Loader: Injecting process 7620 (thread 7548) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,250 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,250 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7620
2020-03-24 10:13:58,266 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7788
2020-03-24 10:13:58,266 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,266 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,266 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,266 [root] DEBUG: Loader: Injecting process 7788 (thread 7792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,266 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,266 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,266 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,266 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,266 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-03-24 10:13:58,282 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7788
2020-03-24 10:13:58,282 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,282 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,282 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,282 [root] DEBUG: Loader: Injecting process 7788 (thread 7792) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,282 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,296 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-03-24 10:13:58,312 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7872
2020-03-24 10:13:58,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,312 [root] DEBUG: Loader: Injecting process 7872 (thread 7876) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,312 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,312 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7872
2020-03-24 10:13:58,328 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7872
2020-03-24 10:13:58,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,344 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,344 [root] DEBUG: Loader: Injecting process 7872 (thread 7876) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,344 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,344 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,344 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,344 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,344 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7872
2020-03-24 10:13:58,359 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8152
2020-03-24 10:13:58,359 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,375 [root] DEBUG: Loader: Injecting process 8152 (thread 8132) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,375 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,375 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8152
2020-03-24 10:13:58,391 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8152
2020-03-24 10:13:58,391 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,405 [root] DEBUG: Loader: Injecting process 8152 (thread 8132) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,405 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,405 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8152
2020-03-24 10:13:58,421 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7272
2020-03-24 10:13:58,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,421 [root] DEBUG: Loader: Injecting process 7272 (thread 7008) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,421 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,421 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7272
2020-03-24 10:13:58,437 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7272
2020-03-24 10:13:58,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,453 [root] DEBUG: Loader: Injecting process 7272 (thread 7008) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,453 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,453 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7272
2020-03-24 10:13:58,469 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7476
2020-03-24 10:13:58,469 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,469 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,469 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,469 [root] DEBUG: Loader: Injecting process 7476 (thread 7460) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,469 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,469 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,469 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,483 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7476
2020-03-24 10:13:58,483 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7476
2020-03-24 10:13:58,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,500 [root] DEBUG: Loader: Injecting process 7476 (thread 7460) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,500 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,500 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7476
2020-03-24 10:13:58,516 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7672
2020-03-24 10:13:58,516 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,516 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,516 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,516 [root] DEBUG: Loader: Injecting process 7672 (thread 7688) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,516 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,516 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,516 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,516 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,516 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7672
2020-03-24 10:13:58,530 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7672
2020-03-24 10:13:58,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,530 [root] DEBUG: Loader: Injecting process 7672 (thread 7688) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,530 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,546 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7672
2020-03-24 10:13:58,562 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7860
2020-03-24 10:13:58,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,562 [root] DEBUG: Loader: Injecting process 7860 (thread 7800) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,562 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,562 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7860
2020-03-24 10:13:58,578 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7860
2020-03-24 10:13:58,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,594 [root] DEBUG: Loader: Injecting process 7860 (thread 7800) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,594 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,594 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,594 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,594 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,594 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7860
2020-03-24 10:13:58,608 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8028
2020-03-24 10:13:58,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,608 [root] DEBUG: Loader: Injecting process 8028 (thread 7980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,608 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,608 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8028
2020-03-24 10:13:58,625 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8028
2020-03-24 10:13:58,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,640 [root] DEBUG: Loader: Injecting process 8028 (thread 7980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,640 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,640 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8028
2020-03-24 10:13:58,655 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8172
2020-03-24 10:13:58,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,655 [root] DEBUG: Loader: Injecting process 8172 (thread 8160) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,655 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,655 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8172
2020-03-24 10:13:58,671 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8172
2020-03-24 10:13:58,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,671 [root] DEBUG: Loader: Injecting process 8172 (thread 8160) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,671 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,671 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8172
2020-03-24 10:13:58,703 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7508
2020-03-24 10:13:58,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,703 [root] DEBUG: Loader: Injecting process 7508 (thread 7456) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,703 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,703 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7508
2020-03-24 10:13:58,717 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7508
2020-03-24 10:13:58,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,733 [root] DEBUG: Loader: Injecting process 7508 (thread 7456) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,733 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,733 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7508
2020-03-24 10:13:58,750 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7808
2020-03-24 10:13:58,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,750 [root] DEBUG: Loader: Injecting process 7808 (thread 7804) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,750 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,750 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7808
2020-03-24 10:13:58,765 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7808
2020-03-24 10:13:58,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,765 [root] DEBUG: Loader: Injecting process 7808 (thread 7804) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,765 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,765 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7808
2020-03-24 10:13:58,796 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7896
2020-03-24 10:13:58,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,796 [root] DEBUG: Loader: Injecting process 7896 (thread 8040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,796 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,796 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7896
2020-03-24 10:13:58,812 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7896
2020-03-24 10:13:58,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,828 [root] DEBUG: Loader: Injecting process 7896 (thread 8040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,828 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,828 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7896
2020-03-24 10:13:58,842 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7292
2020-03-24 10:13:58,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,842 [root] DEBUG: Loader: Injecting process 7292 (thread 7236) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,842 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,842 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7292
2020-03-24 10:13:58,874 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7292
2020-03-24 10:13:58,874 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,874 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,874 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,874 [root] DEBUG: Loader: Injecting process 7292 (thread 7236) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,874 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,874 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,874 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,874 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,874 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7292
2020-03-24 10:13:58,890 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7464
2020-03-24 10:13:58,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,890 [root] DEBUG: Loader: Injecting process 7464 (thread 7472) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,890 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,890 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7464
2020-03-24 10:13:58,921 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7464
2020-03-24 10:13:58,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,921 [root] DEBUG: Loader: Injecting process 7464 (thread 7472) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,921 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,921 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7464
2020-03-24 10:13:58,937 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7752
2020-03-24 10:13:58,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,937 [root] DEBUG: Loader: Injecting process 7752 (thread 7864) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,937 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,937 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7752
2020-03-24 10:13:58,951 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7752
2020-03-24 10:13:58,951 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,951 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,967 [root] DEBUG: Loader: Injecting process 7752 (thread 7864) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,967 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,967 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7752
2020-03-24 10:13:58,983 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7984
2020-03-24 10:13:58,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:58,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:58,983 [root] DEBUG: Loader: Injecting process 7984 (thread 8032) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,983 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,983 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:58,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7984
2020-03-24 10:13:58,999 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7984
2020-03-24 10:13:58,999 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,999 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,015 [root] DEBUG: Loader: Injecting process 7984 (thread 8032) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,015 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,015 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7984
2020-03-24 10:13:59,029 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8176
2020-03-24 10:13:59,029 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,029 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,029 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,029 [root] DEBUG: Loader: Injecting process 8176 (thread 8060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,029 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,029 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,029 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,029 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,029 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8176
2020-03-24 10:13:59,046 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8176
2020-03-24 10:13:59,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,046 [root] DEBUG: Loader: Injecting process 8176 (thread 8060) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,046 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,062 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8176
2020-03-24 10:13:59,076 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7756
2020-03-24 10:13:59,076 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,076 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,076 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,076 [root] DEBUG: Loader: Injecting process 7756 (thread 7576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,092 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,092 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7756
2020-03-24 10:13:59,108 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7756
2020-03-24 10:13:59,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,108 [root] DEBUG: Loader: Injecting process 7756 (thread 7576) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,108 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,108 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7756
2020-03-24 10:13:59,140 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7932
2020-03-24 10:13:59,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,140 [root] DEBUG: Loader: Injecting process 7932 (thread 7960) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,140 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,140 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7932
2020-03-24 10:13:59,154 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7932
2020-03-24 10:13:59,154 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,154 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,154 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,171 [root] DEBUG: Loader: Injecting process 7932 (thread 7960) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,171 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,171 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7932
2020-03-24 10:13:59,186 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8180
2020-03-24 10:13:59,186 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,186 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,186 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,186 [root] DEBUG: Loader: Injecting process 8180 (thread 7392) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,186 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,186 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,186 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,186 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,186 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8180
2020-03-24 10:13:59,201 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8180
2020-03-24 10:13:59,201 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,201 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,201 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,201 [root] DEBUG: Loader: Injecting process 8180 (thread 7392) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,217 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,217 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8180
2020-03-24 10:13:59,233 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7868
2020-03-24 10:13:59,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,233 [root] DEBUG: Loader: Injecting process 7868 (thread 7644) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,233 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,233 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7868
2020-03-24 10:13:59,249 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7868
2020-03-24 10:13:59,249 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,249 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,249 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,249 [root] DEBUG: Loader: Injecting process 7868 (thread 7644) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,249 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,249 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,249 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,249 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,263 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7868
2020-03-24 10:13:59,279 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8088
2020-03-24 10:13:59,279 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,279 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,279 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,279 [root] DEBUG: Loader: Injecting process 8088 (thread 7952) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,279 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,279 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,279 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,279 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,279 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8088
2020-03-24 10:13:59,296 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8088
2020-03-24 10:13:59,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,296 [root] DEBUG: Loader: Injecting process 8088 (thread 7952) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,311 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,311 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,311 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,311 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,311 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8088
2020-03-24 10:13:59,326 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7552
2020-03-24 10:13:59,326 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,326 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,326 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,326 [root] DEBUG: Loader: Injecting process 7552 (thread 7704) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,326 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,326 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,326 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,326 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,326 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7552
2020-03-24 10:13:59,342 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7552
2020-03-24 10:13:59,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,342 [root] DEBUG: Loader: Injecting process 7552 (thread 7704) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,342 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,358 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7552
2020-03-24 10:13:59,374 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7760
2020-03-24 10:13:59,374 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,374 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,374 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,374 [root] DEBUG: Loader: Injecting process 7760 (thread 7744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,374 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,374 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,374 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,374 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,374 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7760
2020-03-24 10:13:59,404 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7760
2020-03-24 10:13:59,404 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,404 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,404 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,404 [root] DEBUG: Loader: Injecting process 7760 (thread 7744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,404 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,404 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,404 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,404 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,404 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7760
2020-03-24 10:13:59,420 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7556
2020-03-24 10:13:59,420 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,420 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,420 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,420 [root] DEBUG: Loader: Injecting process 7556 (thread 7524) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,420 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,420 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,420 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,420 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,420 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7556
2020-03-24 10:13:59,436 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7556
2020-03-24 10:13:59,436 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,436 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,436 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,436 [root] DEBUG: Loader: Injecting process 7556 (thread 7524) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,451 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,451 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,451 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,451 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,451 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7556
2020-03-24 10:13:59,467 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8164
2020-03-24 10:13:59,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,467 [root] DEBUG: Loader: Injecting process 8164 (thread 8148) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,467 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,467 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8164
2020-03-24 10:13:59,483 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8164
2020-03-24 10:13:59,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,497 [root] DEBUG: Loader: Injecting process 8164 (thread 8148) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,497 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,497 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,497 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,497 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,497 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8164
2020-03-24 10:13:59,513 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7936
2020-03-24 10:13:59,513 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,513 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,513 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,513 [root] DEBUG: Loader: Injecting process 7936 (thread 7676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,513 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,513 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,513 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,513 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,513 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7936
2020-03-24 10:13:59,529 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7936
2020-03-24 10:13:59,529 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,529 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,529 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,529 [root] DEBUG: Loader: Injecting process 7936 (thread 7676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,529 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,529 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,529 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,545 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,545 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7936
2020-03-24 10:13:59,561 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7512
2020-03-24 10:13:59,561 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,561 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,561 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,561 [root] DEBUG: Loader: Injecting process 7512 (thread 7612) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,561 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,561 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,561 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,561 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,561 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7512
2020-03-24 10:13:59,575 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7512
2020-03-24 10:13:59,575 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,575 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,575 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,575 [root] DEBUG: Loader: Injecting process 7512 (thread 7612) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,575 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,575 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,575 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,575 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,575 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7512
2020-03-24 10:13:59,608 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7432
2020-03-24 10:13:59,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,608 [root] DEBUG: Loader: Injecting process 7432 (thread 7560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,608 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,608 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-03-24 10:13:59,622 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7432
2020-03-24 10:13:59,622 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,622 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,622 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,622 [root] DEBUG: Loader: Injecting process 7432 (thread 7560) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,638 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,638 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,638 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,638 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,638 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-03-24 10:13:59,654 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7408
2020-03-24 10:13:59,654 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,654 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,654 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,654 [root] DEBUG: Loader: Injecting process 7408 (thread 7232) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,654 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,654 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,654 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,654 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,654 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7408
2020-03-24 10:13:59,670 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7408
2020-03-24 10:13:59,670 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,670 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,670 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,670 [root] DEBUG: Loader: Injecting process 7408 (thread 7232) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,670 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,670 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,670 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,670 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,686 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7408
2020-03-24 10:13:59,700 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8084
2020-03-24 10:13:59,700 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,700 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,700 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,700 [root] DEBUG: Loader: Injecting process 8084 (thread 7304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,700 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,700 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,700 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,700 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,700 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8084
2020-03-24 10:13:59,717 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8084
2020-03-24 10:13:59,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,732 [root] DEBUG: Loader: Injecting process 8084 (thread 7304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,732 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,732 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,732 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,732 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,732 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8084
2020-03-24 10:13:59,747 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7988
2020-03-24 10:13:59,747 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,747 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,747 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,747 [root] DEBUG: Loader: Injecting process 7988 (thread 7520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,747 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,747 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,747 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,747 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,747 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7988
2020-03-24 10:13:59,763 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7988
2020-03-24 10:13:59,763 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,763 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,763 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,763 [root] DEBUG: Loader: Injecting process 7988 (thread 7520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,763 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,779 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,779 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,779 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,779 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7988
2020-03-24 10:13:59,795 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8156
2020-03-24 10:13:59,795 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,795 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,795 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,795 [root] DEBUG: Loader: Injecting process 8156 (thread 7516) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,795 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,795 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,795 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,795 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,795 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8156
2020-03-24 10:13:59,809 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8156
2020-03-24 10:13:59,809 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,809 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,825 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,825 [root] DEBUG: Loader: Injecting process 8156 (thread 7516) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,825 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,825 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,825 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,825 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,825 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8156
2020-03-24 10:13:59,842 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7944
2020-03-24 10:13:59,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,842 [root] DEBUG: Loader: Injecting process 7944 (thread 7280) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,842 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,842 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7944
2020-03-24 10:13:59,857 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 7944
2020-03-24 10:13:59,857 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,857 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,857 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,857 [root] DEBUG: Loader: Injecting process 7944 (thread 7280) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,857 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,857 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,857 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,872 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,872 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7944
2020-03-24 10:13:59,888 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8272
2020-03-24 10:13:59,888 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,888 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,888 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,888 [root] DEBUG: Loader: Injecting process 8272 (thread 8276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,888 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,888 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,888 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,888 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,888 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8272
2020-03-24 10:13:59,904 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8272
2020-03-24 10:13:59,904 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,904 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,904 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,904 [root] DEBUG: Loader: Injecting process 8272 (thread 8276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,920 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,920 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,920 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,920 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,920 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8272
2020-03-24 10:13:59,934 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8368
2020-03-24 10:13:59,934 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,934 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,934 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,934 [root] DEBUG: Loader: Injecting process 8368 (thread 8372) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,934 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,934 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,934 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,934 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,934 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8368
2020-03-24 10:13:59,950 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8368
2020-03-24 10:13:59,950 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,950 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,966 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,966 [root] DEBUG: Loader: Injecting process 8368 (thread 8372) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,966 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,966 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,966 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,966 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,966 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8368
2020-03-24 10:13:59,982 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8464
2020-03-24 10:13:59,982 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,982 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,982 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,982 [root] DEBUG: Loader: Injecting process 8464 (thread 8468) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,982 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,982 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,982 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,982 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,982 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8464
2020-03-24 10:13:59,997 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8464
2020-03-24 10:13:59,997 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,997 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:13:59,997 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:13:59,997 [root] DEBUG: Loader: Injecting process 8464 (thread 8468) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,997 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,997 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:13:59,997 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,997 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,013 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8464
2020-03-24 10:14:00,029 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8560
2020-03-24 10:14:00,029 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,029 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,029 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,029 [root] DEBUG: Loader: Injecting process 8560 (thread 8564) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,029 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,029 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,029 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,029 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,029 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8560
2020-03-24 10:14:00,043 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8560
2020-03-24 10:14:00,043 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,043 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,043 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,043 [root] DEBUG: Loader: Injecting process 8560 (thread 8564) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,059 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,059 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,059 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,059 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,059 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8560
2020-03-24 10:14:00,075 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8656
2020-03-24 10:14:00,075 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,075 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,075 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,075 [root] DEBUG: Loader: Injecting process 8656 (thread 8660) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,075 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,075 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,075 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,075 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,075 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8656
2020-03-24 10:14:00,091 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8656
2020-03-24 10:14:00,091 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,091 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,107 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,107 [root] DEBUG: Loader: Injecting process 8656 (thread 8660) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,107 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,107 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,107 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,107 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,107 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8656
2020-03-24 10:14:00,121 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8752
2020-03-24 10:14:00,121 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,121 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,121 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,121 [root] DEBUG: Loader: Injecting process 8752 (thread 8756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,121 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,121 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,121 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,121 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,121 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8752
2020-03-24 10:14:00,138 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8752
2020-03-24 10:14:00,138 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,138 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,154 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,154 [root] DEBUG: Loader: Injecting process 8752 (thread 8756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,154 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,154 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,154 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,154 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,154 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8752
2020-03-24 10:14:00,168 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8848
2020-03-24 10:14:00,168 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,168 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,168 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,168 [root] DEBUG: Loader: Injecting process 8848 (thread 8852) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,168 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,168 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,168 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,168 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,168 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8848
2020-03-24 10:14:00,184 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8848
2020-03-24 10:14:00,184 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,184 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,184 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,184 [root] DEBUG: Loader: Injecting process 8848 (thread 8852) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,184 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,200 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,200 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,200 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,200 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8848
2020-03-24 10:14:00,216 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8944
2020-03-24 10:14:00,216 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,216 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,216 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,216 [root] DEBUG: Loader: Injecting process 8944 (thread 8948) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,216 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,216 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,216 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,216 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,216 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8944
2020-03-24 10:14:00,232 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8944
2020-03-24 10:14:00,232 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,232 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,246 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,246 [root] DEBUG: Loader: Injecting process 8944 (thread 8948) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,246 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,246 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,246 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,246 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,246 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8944
2020-03-24 10:14:00,263 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9040
2020-03-24 10:14:00,263 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,263 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,263 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,263 [root] DEBUG: Loader: Injecting process 9040 (thread 9044) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,263 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,263 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,263 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,263 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,263 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9040
2020-03-24 10:14:00,278 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9040
2020-03-24 10:14:00,278 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,278 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,293 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,293 [root] DEBUG: Loader: Injecting process 9040 (thread 9044) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,293 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,293 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,293 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,293 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,293 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9040
2020-03-24 10:14:00,309 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9136
2020-03-24 10:14:00,309 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,309 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,309 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,309 [root] DEBUG: Loader: Injecting process 9136 (thread 9140) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,309 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,309 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,309 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,309 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,325 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9136
2020-03-24 10:14:00,341 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9136
2020-03-24 10:14:00,341 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,341 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,341 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,341 [root] DEBUG: Loader: Injecting process 9136 (thread 9140) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,341 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,341 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,341 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,341 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,341 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9136
2020-03-24 10:14:00,355 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8220
2020-03-24 10:14:00,355 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,355 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,355 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,355 [root] DEBUG: Loader: Injecting process 8220 (thread 8224) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,355 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,355 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,355 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,355 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,371 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8220
2020-03-24 10:14:00,388 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8220
2020-03-24 10:14:00,388 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,388 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,388 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,388 [root] DEBUG: Loader: Injecting process 8220 (thread 8224) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,388 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,388 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,388 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,388 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,388 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8220
2020-03-24 10:14:00,403 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8288
2020-03-24 10:14:00,403 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,403 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,403 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,403 [root] DEBUG: Loader: Injecting process 8288 (thread 8340) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,403 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,403 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,403 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,403 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,403 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8288
2020-03-24 10:14:00,434 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8288
2020-03-24 10:14:00,434 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,434 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,434 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,434 [root] DEBUG: Loader: Injecting process 8288 (thread 8340) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,434 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,434 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,434 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,434 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,434 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8288
2020-03-24 10:14:00,450 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8448
2020-03-24 10:14:00,450 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,450 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,450 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,450 [root] DEBUG: Loader: Injecting process 8448 (thread 8452) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,450 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,450 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,450 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,450 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,450 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8448
2020-03-24 10:14:00,466 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8448
2020-03-24 10:14:00,466 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,466 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,466 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,480 [root] DEBUG: Loader: Injecting process 8448 (thread 8452) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,480 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,480 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,480 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,480 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,480 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8448
2020-03-24 10:14:00,496 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8524
2020-03-24 10:14:00,496 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,496 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,496 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,496 [root] DEBUG: Loader: Injecting process 8524 (thread 8520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,496 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,496 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,496 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,496 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,496 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8524
2020-03-24 10:14:00,512 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8524
2020-03-24 10:14:00,512 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,512 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,528 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,528 [root] DEBUG: Loader: Injecting process 8524 (thread 8520) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,528 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,528 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,528 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,528 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,528 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8524
2020-03-24 10:14:00,543 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8684
2020-03-24 10:14:00,543 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,543 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,543 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,543 [root] DEBUG: Loader: Injecting process 8684 (thread 8688) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,543 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,543 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,543 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,543 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,543 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8684
2020-03-24 10:14:00,559 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8684
2020-03-24 10:14:00,559 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,559 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,575 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,575 [root] DEBUG: Loader: Injecting process 8684 (thread 8688) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,575 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,575 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,575 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,575 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,575 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8684
2020-03-24 10:14:00,589 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8796
2020-03-24 10:14:00,589 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,589 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,589 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,589 [root] DEBUG: Loader: Injecting process 8796 (thread 8800) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,589 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,589 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,589 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,589 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,589 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8796
2020-03-24 10:14:00,605 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8796
2020-03-24 10:14:00,605 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,605 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,605 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,605 [root] DEBUG: Loader: Injecting process 8796 (thread 8800) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,621 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,621 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,621 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,621 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,621 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8796
2020-03-24 10:14:00,637 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8864
2020-03-24 10:14:00,637 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,637 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,637 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,637 [root] DEBUG: Loader: Injecting process 8864 (thread 8916) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,637 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,637 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,637 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,637 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,637 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8864
2020-03-24 10:14:00,653 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8864
2020-03-24 10:14:00,653 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,653 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,667 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,667 [root] DEBUG: Loader: Injecting process 8864 (thread 8916) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,667 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,667 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,667 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,667 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,667 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8864
2020-03-24 10:14:00,684 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9024
2020-03-24 10:14:00,684 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,684 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,684 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,684 [root] DEBUG: Loader: Injecting process 9024 (thread 9028) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,684 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,684 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,684 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,684 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,684 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9024
2020-03-24 10:14:00,700 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9024
2020-03-24 10:14:00,700 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,700 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,714 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,714 [root] DEBUG: Loader: Injecting process 9024 (thread 9028) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,714 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,714 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,714 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,714 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,714 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9024
2020-03-24 10:14:00,730 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9104
2020-03-24 10:14:00,730 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,730 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,730 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,730 [root] DEBUG: Loader: Injecting process 9104 (thread 9096) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,730 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,730 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,730 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,730 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,730 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9104
2020-03-24 10:14:00,746 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9104
2020-03-24 10:14:00,746 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,746 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,762 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,762 [root] DEBUG: Loader: Injecting process 9104 (thread 9096) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,762 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,762 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,762 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,762 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,762 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9104
2020-03-24 10:14:00,778 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8252
2020-03-24 10:14:00,778 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,778 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,778 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,778 [root] DEBUG: Loader: Injecting process 8252 (thread 8264) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,778 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,778 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,778 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,778 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,778 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8252
2020-03-24 10:14:00,792 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8252
2020-03-24 10:14:00,792 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,792 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,792 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,792 [root] DEBUG: Loader: Injecting process 8252 (thread 8264) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,792 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,809 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,809 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,809 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,809 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8252
2020-03-24 10:14:00,823 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8364
2020-03-24 10:14:00,823 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,823 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,823 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,823 [root] DEBUG: Loader: Injecting process 8364 (thread 8396) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,823 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,823 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,823 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,823 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,823 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8364
2020-03-24 10:14:00,839 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8364
2020-03-24 10:14:00,839 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,839 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,839 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,839 [root] DEBUG: Loader: Injecting process 8364 (thread 8396) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,855 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,855 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,855 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,855 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,855 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8364
2020-03-24 10:14:00,871 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8428
2020-03-24 10:14:00,871 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,871 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,871 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,871 [root] DEBUG: Loader: Injecting process 8428 (thread 8532) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,871 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,871 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,871 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,871 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,871 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8428
2020-03-24 10:14:00,887 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8428
2020-03-24 10:14:00,887 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,887 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,887 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,887 [root] DEBUG: Loader: Injecting process 8428 (thread 8532) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,887 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,887 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,887 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,901 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,901 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8428
2020-03-24 10:14:00,917 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8620
2020-03-24 10:14:00,917 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,917 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,917 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,917 [root] DEBUG: Loader: Injecting process 8620 (thread 8616) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,917 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,917 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,917 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,917 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8620
2020-03-24 10:14:00,934 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8620
2020-03-24 10:14:00,934 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,934 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,934 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,934 [root] DEBUG: Loader: Injecting process 8620 (thread 8616) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,934 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,934 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,934 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,948 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,948 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8620
2020-03-24 10:14:00,964 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8716
2020-03-24 10:14:00,964 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,964 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,964 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,964 [root] DEBUG: Loader: Injecting process 8716 (thread 8744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,964 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,964 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,964 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,964 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,964 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8716
2020-03-24 10:14:00,980 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8716
2020-03-24 10:14:00,980 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,980 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:00,996 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:00,996 [root] DEBUG: Loader: Injecting process 8716 (thread 8744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,996 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,996 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,996 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,996 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:00,996 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8716
2020-03-24 10:14:01,012 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8912
2020-03-24 10:14:01,012 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,012 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,012 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,012 [root] DEBUG: Loader: Injecting process 8912 (thread 8908) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,012 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,012 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,012 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,012 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,012 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8912
2020-03-24 10:14:01,026 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8912
2020-03-24 10:14:01,026 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,026 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,026 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,042 [root] DEBUG: Loader: Injecting process 8912 (thread 8908) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,042 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,042 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,042 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8912
2020-03-24 10:14:01,058 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9080
2020-03-24 10:14:01,058 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,058 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,058 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,058 [root] DEBUG: Loader: Injecting process 9080 (thread 9084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,058 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,058 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,058 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,058 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,058 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9080
2020-03-24 10:14:01,073 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9080
2020-03-24 10:14:01,073 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,073 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,089 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,089 [root] DEBUG: Loader: Injecting process 9080 (thread 9084) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,089 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,089 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,089 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,089 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,089 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9080
2020-03-24 10:14:01,105 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9164
2020-03-24 10:14:01,105 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,105 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,105 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,105 [root] DEBUG: Loader: Injecting process 9164 (thread 8208) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,105 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,105 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,105 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,105 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,105 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9164
2020-03-24 10:14:01,121 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9164
2020-03-24 10:14:01,121 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,121 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,135 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,135 [root] DEBUG: Loader: Injecting process 9164 (thread 8208) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,135 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,135 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,135 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,135 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,135 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9164
2020-03-24 10:14:01,151 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8336
2020-03-24 10:14:01,151 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,151 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,151 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,151 [root] DEBUG: Loader: Injecting process 8336 (thread 8332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,151 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,151 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,151 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,151 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,151 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8336
2020-03-24 10:14:01,167 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8336
2020-03-24 10:14:01,167 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,167 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,183 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,183 [root] DEBUG: Loader: Injecting process 8336 (thread 8332) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,183 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,183 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,183 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,183 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,183 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8336
2020-03-24 10:14:01,198 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8460
2020-03-24 10:14:01,198 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,198 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,198 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,198 [root] DEBUG: Loader: Injecting process 8460 (thread 8400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,198 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,198 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,198 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,198 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,198 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8460
2020-03-24 10:14:01,213 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8460
2020-03-24 10:14:01,213 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,213 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,230 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,230 [root] DEBUG: Loader: Injecting process 8460 (thread 8400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,230 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,230 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,230 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,230 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,230 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8460
2020-03-24 10:14:01,246 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8652
2020-03-24 10:14:01,246 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,246 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,246 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,246 [root] DEBUG: Loader: Injecting process 8652 (thread 8676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,246 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,246 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,246 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,246 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,246 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8652
2020-03-24 10:14:01,260 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8652
2020-03-24 10:14:01,260 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,260 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,260 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,260 [root] DEBUG: Loader: Injecting process 8652 (thread 8676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,260 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,276 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,276 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,276 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,276 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8652
2020-03-24 10:14:01,292 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8820
2020-03-24 10:14:01,292 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,292 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,292 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,292 [root] DEBUG: Loader: Injecting process 8820 (thread 8768) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,292 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,292 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,292 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,292 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,292 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8820
2020-03-24 10:14:01,308 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8820
2020-03-24 10:14:01,308 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,308 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,308 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,308 [root] DEBUG: Loader: Injecting process 8820 (thread 8768) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,308 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,308 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,308 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,323 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,323 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8820
2020-03-24 10:14:01,338 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8940
2020-03-24 10:14:01,338 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,338 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,338 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,338 [root] DEBUG: Loader: Injecting process 8940 (thread 8980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,338 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,338 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,338 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,338 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,338 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8940
2020-03-24 10:14:01,355 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8940
2020-03-24 10:14:01,355 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,355 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,355 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,355 [root] DEBUG: Loader: Injecting process 8940 (thread 8980) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,355 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,369 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,369 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,369 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,369 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8940
2020-03-24 10:14:01,385 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9156
2020-03-24 10:14:01,385 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,385 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,385 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,385 [root] DEBUG: Loader: Injecting process 9156 (thread 9152) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,385 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,385 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,385 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,385 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,385 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9156
2020-03-24 10:14:01,401 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9156
2020-03-24 10:14:01,401 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,401 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,417 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,417 [root] DEBUG: Loader: Injecting process 9156 (thread 9152) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,417 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,417 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,417 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,417 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,417 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9156
2020-03-24 10:14:01,433 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8312
2020-03-24 10:14:01,433 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,433 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,433 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,433 [root] DEBUG: Loader: Injecting process 8312 (thread 8304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,433 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,433 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,433 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,433 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,433 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8312
2020-03-24 10:14:01,463 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8312
2020-03-24 10:14:01,463 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,463 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,463 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,463 [root] DEBUG: Loader: Injecting process 8312 (thread 8304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,463 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,463 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,463 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,463 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,463 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8312
2020-03-24 10:14:01,480 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8548
2020-03-24 10:14:01,480 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,480 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,480 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,480 [root] DEBUG: Loader: Injecting process 8548 (thread 8544) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,480 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,480 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,480 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,480 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,480 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8548
2020-03-24 10:14:01,494 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8548
2020-03-24 10:14:01,494 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,494 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,494 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,510 [root] DEBUG: Loader: Injecting process 8548 (thread 8544) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,510 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,510 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,510 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,510 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,510 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8548
2020-03-24 10:14:01,526 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8748
2020-03-24 10:14:01,526 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,526 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,526 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,526 [root] DEBUG: Loader: Injecting process 8748 (thread 8780) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,526 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,526 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,526 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,526 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,526 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8748
2020-03-24 10:14:01,542 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8748
2020-03-24 10:14:01,542 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,542 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,558 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,558 [root] DEBUG: Loader: Injecting process 8748 (thread 8780) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,558 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,558 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,558 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,558 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,558 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8748
2020-03-24 10:14:01,572 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8840
2020-03-24 10:14:01,572 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,572 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,572 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,572 [root] DEBUG: Loader: Injecting process 8840 (thread 8964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,572 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,572 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,572 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,572 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,588 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8840
2020-03-24 10:14:01,588 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8840
2020-03-24 10:14:01,604 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,604 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,604 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,604 [root] DEBUG: Loader: Injecting process 8840 (thread 8964) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,604 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,604 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,604 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,604 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,604 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8840
2020-03-24 10:14:01,619 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9180
2020-03-24 10:14:01,619 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,619 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,619 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,619 [root] DEBUG: Loader: Injecting process 9180 (thread 9004) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,619 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,619 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,619 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,619 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,635 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9180
2020-03-24 10:14:01,635 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9180
2020-03-24 10:14:01,651 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,651 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,651 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,651 [root] DEBUG: Loader: Injecting process 9180 (thread 9004) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,651 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,651 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,651 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,651 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,651 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9180
2020-03-24 10:14:01,667 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9196
2020-03-24 10:14:01,667 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,667 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,681 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,681 [root] DEBUG: Loader: Injecting process 9196 (thread 9212) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,681 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,681 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,681 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,681 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,681 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9196
2020-03-24 10:14:01,697 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9196
2020-03-24 10:14:01,697 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,697 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,697 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,697 [root] DEBUG: Loader: Injecting process 9196 (thread 9212) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,697 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,697 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,697 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,697 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,713 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9196
2020-03-24 10:14:01,729 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8600
2020-03-24 10:14:01,729 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,729 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,729 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,729 [root] DEBUG: Loader: Injecting process 8600 (thread 8480) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,729 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,729 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,729 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,729 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,729 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8600
2020-03-24 10:14:01,744 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8600
2020-03-24 10:14:01,744 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,744 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,759 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,759 [root] DEBUG: Loader: Injecting process 8600 (thread 8480) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,759 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,759 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,759 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,759 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,759 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8600
2020-03-24 10:14:01,776 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8704
2020-03-24 10:14:01,776 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,776 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,776 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,776 [root] DEBUG: Loader: Injecting process 8704 (thread 8788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,776 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,776 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,776 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,776 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,776 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8704
2020-03-24 10:14:01,792 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8704
2020-03-24 10:14:01,792 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,792 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,806 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,806 [root] DEBUG: Loader: Injecting process 8704 (thread 8788) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,806 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,806 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,806 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,806 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,806 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8704
2020-03-24 10:14:01,822 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8928
2020-03-24 10:14:01,822 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,822 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,822 [root] DEBUG: Loader: Injecting process 8928 (thread 9068) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,822 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,822 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,822 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,838 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8928
2020-03-24 10:14:01,838 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8928
2020-03-24 10:14:01,854 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,854 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,854 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,854 [root] DEBUG: Loader: Injecting process 8928 (thread 9068) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,854 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,854 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,854 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,854 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,854 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8928
2020-03-24 10:14:01,869 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8240
2020-03-24 10:14:01,869 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,869 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,869 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,869 [root] DEBUG: Loader: Injecting process 8240 (thread 8244) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,869 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,869 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,884 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,884 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,884 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8240
2020-03-24 10:14:01,901 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8240
2020-03-24 10:14:01,901 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,901 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,901 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,901 [root] DEBUG: Loader: Injecting process 8240 (thread 8244) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,901 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,901 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,901 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,901 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,901 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8240
2020-03-24 10:14:01,915 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8352
2020-03-24 10:14:01,915 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,915 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,915 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,915 [root] DEBUG: Loader: Injecting process 8352 (thread 8420) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,915 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,915 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,915 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,931 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,931 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8352
2020-03-24 10:14:01,947 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8352
2020-03-24 10:14:01,947 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,947 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,947 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,947 [root] DEBUG: Loader: Injecting process 8352 (thread 8420) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,947 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,947 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,947 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,947 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,947 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8352
2020-03-24 10:14:01,963 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8808
2020-03-24 10:14:01,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,963 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,963 [root] DEBUG: Loader: Injecting process 8808 (thread 8892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,963 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,963 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,963 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,963 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,963 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8808
2020-03-24 10:14:01,979 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8808
2020-03-24 10:14:01,979 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,979 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:01,993 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:01,993 [root] DEBUG: Loader: Injecting process 8808 (thread 8892) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,993 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,993 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,993 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,993 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:01,993 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8808
2020-03-24 10:14:02,026 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9116
2020-03-24 10:14:02,026 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,026 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,026 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,026 [root] DEBUG: Loader: Injecting process 9116 (thread 9160) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,026 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,026 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,026 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,026 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,026 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9116
2020-03-24 10:14:02,040 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9116
2020-03-24 10:14:02,040 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,040 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,056 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,056 [root] DEBUG: Loader: Injecting process 9116 (thread 9160) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,056 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,056 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,056 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,056 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,056 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9116
2020-03-24 10:14:02,072 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9088
2020-03-24 10:14:02,072 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,072 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,072 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,072 [root] DEBUG: Loader: Injecting process 9088 (thread 8416) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,072 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,072 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,072 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,072 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,072 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9088
2020-03-24 10:14:02,088 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9088
2020-03-24 10:14:02,088 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,088 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,088 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,088 [root] DEBUG: Loader: Injecting process 9088 (thread 8416) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,088 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,104 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,104 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,104 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,104 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9088
2020-03-24 10:14:02,118 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8588
2020-03-24 10:14:02,118 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,118 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,118 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,118 [root] DEBUG: Loader: Injecting process 8588 (thread 8712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,118 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,118 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,118 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,118 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,118 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8588
2020-03-24 10:14:02,134 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8588
2020-03-24 10:14:02,134 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,134 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,150 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,150 [root] DEBUG: Loader: Injecting process 8588 (thread 8712) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,150 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,150 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,150 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,150 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,150 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8588
2020-03-24 10:14:02,181 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8960
2020-03-24 10:14:02,181 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,181 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,181 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,181 [root] DEBUG: Loader: Injecting process 8960 (thread 8936) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,181 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,181 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,197 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,197 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,197 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8960
2020-03-24 10:14:02,197 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8960
2020-03-24 10:14:02,197 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,197 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,213 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,213 [root] DEBUG: Loader: Injecting process 8960 (thread 8936) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,213 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,213 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,213 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,213 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,213 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8960
2020-03-24 10:14:02,227 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8436
2020-03-24 10:14:02,227 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,227 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,227 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,227 [root] DEBUG: Loader: Injecting process 8436 (thread 8296) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,227 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,227 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,227 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,227 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,227 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8436
2020-03-24 10:14:02,243 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8436
2020-03-24 10:14:02,243 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,243 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,259 [root] DEBUG: Loader: Injecting process 8436 (thread 8296) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,259 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,259 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8436
2020-03-24 10:14:02,275 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8868
2020-03-24 10:14:02,275 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,275 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,275 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,275 [root] DEBUG: Loader: Injecting process 8868 (thread 8884) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,275 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,275 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,275 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,275 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,275 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8868
2020-03-24 10:14:02,290 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8868
2020-03-24 10:14:02,290 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,290 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,290 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,290 [root] DEBUG: Loader: Injecting process 8868 (thread 8884) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,290 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,290 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,305 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,305 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,305 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8868
2020-03-24 10:14:02,322 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9120
2020-03-24 10:14:02,322 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,322 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,322 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,322 [root] DEBUG: Loader: Injecting process 9120 (thread 8388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,322 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,322 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,322 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,322 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,322 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9120
2020-03-24 10:14:02,338 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9120
2020-03-24 10:14:02,338 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,338 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,338 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,338 [root] DEBUG: Loader: Injecting process 9120 (thread 8388) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,338 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,352 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,352 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,352 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,352 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9120
2020-03-24 10:14:02,368 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8816
2020-03-24 10:14:02,368 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,368 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,368 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,368 [root] DEBUG: Loader: Injecting process 8816 (thread 8804) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,368 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,368 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,368 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,368 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,368 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8816
2020-03-24 10:14:02,400 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8816
2020-03-24 10:14:02,400 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,400 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,400 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,400 [root] DEBUG: Loader: Injecting process 8816 (thread 8804) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,400 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,400 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,400 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,400 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,400 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8816
2020-03-24 10:14:02,415 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8872
2020-03-24 10:14:02,415 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,415 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,415 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,415 [root] DEBUG: Loader: Injecting process 8872 (thread 8972) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,415 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,415 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,415 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,415 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,415 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8872
2020-03-24 10:14:02,430 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8872
2020-03-24 10:14:02,430 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,430 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,447 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,447 [root] DEBUG: Loader: Injecting process 8872 (thread 8972) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,447 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,447 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,447 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,447 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,447 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8872
2020-03-24 10:14:02,461 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8880
2020-03-24 10:14:02,461 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,461 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,461 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,461 [root] DEBUG: Loader: Injecting process 8880 (thread 8932) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,461 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,461 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,461 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,461 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,461 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8880
2020-03-24 10:14:02,477 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8880
2020-03-24 10:14:02,477 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,493 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,493 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,493 [root] DEBUG: Loader: Injecting process 8880 (thread 8932) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,493 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,493 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,493 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8880
2020-03-24 10:14:02,509 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9168
2020-03-24 10:14:02,509 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,509 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,509 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,509 [root] DEBUG: Loader: Injecting process 9168 (thread 8228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,509 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,509 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,509 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,509 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,509 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9168
2020-03-24 10:14:02,525 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9168
2020-03-24 10:14:02,525 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,525 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,525 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,525 [root] DEBUG: Loader: Injecting process 9168 (thread 8228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,525 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,525 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,525 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,525 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,539 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9168
2020-03-24 10:14:02,555 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9076
2020-03-24 10:14:02,555 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,555 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,555 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,555 [root] DEBUG: Loader: Injecting process 9076 (thread 9016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,555 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,555 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,555 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,555 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,555 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9076
2020-03-24 10:14:02,572 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9076
2020-03-24 10:14:02,572 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,572 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,572 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,572 [root] DEBUG: Loader: Injecting process 9076 (thread 9016) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,572 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,572 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,572 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,572 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,586 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9076
2020-03-24 10:14:02,602 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9204
2020-03-24 10:14:02,602 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,602 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,602 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,602 [root] DEBUG: Loader: Injecting process 9204 (thread 9124) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,602 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,602 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,602 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,602 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,602 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9204
2020-03-24 10:14:02,618 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9204
2020-03-24 10:14:02,618 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,618 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,618 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,618 [root] DEBUG: Loader: Injecting process 9204 (thread 9124) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,634 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,634 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,634 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,634 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,634 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9204
2020-03-24 10:14:02,650 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8500
2020-03-24 10:14:02,650 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,650 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,650 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,650 [root] DEBUG: Loader: Injecting process 8500 (thread 8580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,650 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,650 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,650 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,650 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,650 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8500
2020-03-24 10:14:02,664 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8500
2020-03-24 10:14:02,664 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,664 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,664 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,664 [root] DEBUG: Loader: Injecting process 8500 (thread 8580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,664 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,664 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,664 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,664 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,664 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8500
2020-03-24 10:14:02,696 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9128
2020-03-24 10:14:02,696 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,696 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,696 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,696 [root] DEBUG: Loader: Injecting process 9128 (thread 9036) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,696 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,696 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,696 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,696 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,696 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9128
2020-03-24 10:14:02,711 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9128
2020-03-24 10:14:02,711 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,711 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,711 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,711 [root] DEBUG: Loader: Injecting process 9128 (thread 9036) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,711 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,727 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,727 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,727 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,727 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9128
2020-03-24 10:14:02,743 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8528
2020-03-24 10:14:02,743 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,743 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,743 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,743 [root] DEBUG: Loader: Injecting process 8528 (thread 8236) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,743 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,743 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,743 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,743 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,743 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8528
2020-03-24 10:14:02,759 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8528
2020-03-24 10:14:02,759 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,759 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,759 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,759 [root] DEBUG: Loader: Injecting process 8528 (thread 8236) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,773 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,773 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,773 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,773 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,773 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8528
2020-03-24 10:14:02,789 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8484
2020-03-24 10:14:02,789 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,789 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,789 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,789 [root] DEBUG: Loader: Injecting process 8484 (thread 8844) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,789 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,789 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,789 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,789 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,789 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8484
2020-03-24 10:14:02,805 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8484
2020-03-24 10:14:02,805 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,805 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,805 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,805 [root] DEBUG: Loader: Injecting process 8484 (thread 8844) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,821 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,821 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,821 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,821 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,821 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8484
2020-03-24 10:14:02,836 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8708
2020-03-24 10:14:02,836 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,836 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,836 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,836 [root] DEBUG: Loader: Injecting process 8708 (thread 8596) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,836 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,836 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,836 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,836 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,836 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8708
2020-03-24 10:14:02,851 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 8708
2020-03-24 10:14:02,851 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,851 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,851 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,851 [root] DEBUG: Loader: Injecting process 8708 (thread 8596) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,851 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,851 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,868 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,868 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,868 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8708
2020-03-24 10:14:02,884 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9236
2020-03-24 10:14:02,884 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,884 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,898 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,898 [root] DEBUG: Loader: Injecting process 9236 (thread 9240) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,898 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,898 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,898 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,898 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,898 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9236
2020-03-24 10:14:02,914 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9236
2020-03-24 10:14:02,914 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,914 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,930 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,930 [root] DEBUG: Loader: Injecting process 9236 (thread 9240) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,930 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,930 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,930 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,930 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,930 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9236
2020-03-24 10:14:02,946 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9332
2020-03-24 10:14:02,946 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,946 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,946 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,946 [root] DEBUG: Loader: Injecting process 9332 (thread 9336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,946 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,946 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,946 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,946 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,946 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9332
2020-03-24 10:14:02,961 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9332
2020-03-24 10:14:02,961 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,961 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,976 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,976 [root] DEBUG: Loader: Injecting process 9332 (thread 9336) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,976 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,976 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,976 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,976 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,976 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9332
2020-03-24 10:14:02,993 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9428
2020-03-24 10:14:02,993 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,993 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:02,993 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:02,993 [root] DEBUG: Loader: Injecting process 9428 (thread 9432) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,993 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,993 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,993 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,993 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:02,993 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9428
2020-03-24 10:14:03,007 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9428
2020-03-24 10:14:03,007 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,007 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,023 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,023 [root] DEBUG: Loader: Injecting process 9428 (thread 9432) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,023 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,023 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,023 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,023 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,023 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9428
2020-03-24 10:14:03,039 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9524
2020-03-24 10:14:03,039 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,039 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,039 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,039 [root] DEBUG: Loader: Injecting process 9524 (thread 9528) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,039 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,039 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,039 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,039 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,039 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9524
2020-03-24 10:14:03,055 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9524
2020-03-24 10:14:03,055 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,055 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,055 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,055 [root] DEBUG: Loader: Injecting process 9524 (thread 9528) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,055 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,071 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,071 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,071 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,071 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9524
2020-03-24 10:14:03,085 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9620
2020-03-24 10:14:03,085 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,085 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,085 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,085 [root] DEBUG: Loader: Injecting process 9620 (thread 9624) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,085 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,085 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,085 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,085 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,085 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9620
2020-03-24 10:14:03,101 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9620
2020-03-24 10:14:03,101 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,101 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,101 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,101 [root] DEBUG: Loader: Injecting process 9620 (thread 9624) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,101 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,101 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,101 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,101 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,118 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9620
2020-03-24 10:14:03,132 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9716
2020-03-24 10:14:03,132 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,132 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,132 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,132 [root] DEBUG: Loader: Injecting process 9716 (thread 9720) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,132 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,132 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,132 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,132 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,132 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9716
2020-03-24 10:14:03,148 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9716
2020-03-24 10:14:03,148 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,148 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,148 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,148 [root] DEBUG: Loader: Injecting process 9716 (thread 9720) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,148 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,164 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,164 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,164 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,164 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9716
2020-03-24 10:14:03,180 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9812
2020-03-24 10:14:03,180 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,180 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,180 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,180 [root] DEBUG: Loader: Injecting process 9812 (thread 9816) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,180 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,180 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,180 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,180 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,180 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9812
2020-03-24 10:14:03,196 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9812
2020-03-24 10:14:03,196 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,196 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,196 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,210 [root] DEBUG: Loader: Injecting process 9812 (thread 9816) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,210 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,210 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,210 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,210 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,210 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9812
2020-03-24 10:14:03,226 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9908
2020-03-24 10:14:03,226 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,226 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,226 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,226 [root] DEBUG: Loader: Injecting process 9908 (thread 9912) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,226 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,226 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,226 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,226 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9908
2020-03-24 10:14:03,242 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9908
2020-03-24 10:14:03,242 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,242 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,257 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,257 [root] DEBUG: Loader: Injecting process 9908 (thread 9912) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,257 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,257 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,257 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,257 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,257 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9908
2020-03-24 10:14:03,273 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10004
2020-03-24 10:14:03,273 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,273 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,273 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,273 [root] DEBUG: Loader: Injecting process 10004 (thread 10008) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,273 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,273 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,273 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,273 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,289 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10004
2020-03-24 10:14:03,305 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10004
2020-03-24 10:14:03,305 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,305 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,305 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,305 [root] DEBUG: Loader: Injecting process 10004 (thread 10008) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,305 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,305 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,305 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,305 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,305 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10004
2020-03-24 10:14:03,335 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10100
2020-03-24 10:14:03,335 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,335 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,335 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,335 [root] DEBUG: Loader: Injecting process 10100 (thread 10104) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,335 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,335 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,335 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,335 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,335 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10100
2020-03-24 10:14:03,351 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10100
2020-03-24 10:14:03,351 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,351 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,351 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,351 [root] DEBUG: Loader: Injecting process 10100 (thread 10104) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,351 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,351 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,367 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,367 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,367 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10100
2020-03-24 10:14:03,382 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10196
2020-03-24 10:14:03,382 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,382 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,382 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,382 [root] DEBUG: Loader: Injecting process 10196 (thread 10200) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,382 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,382 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,382 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,382 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,382 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10196
2020-03-24 10:14:03,398 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10196
2020-03-24 10:14:03,398 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,398 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,414 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,414 [root] DEBUG: Loader: Injecting process 10196 (thread 10200) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,414 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,414 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,414 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,414 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,414 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10196
2020-03-24 10:14:03,430 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9280
2020-03-24 10:14:03,430 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,430 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,430 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,430 [root] DEBUG: Loader: Injecting process 9280 (thread 9276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,430 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,430 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,430 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,430 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,430 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9280
2020-03-24 10:14:03,444 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9280
2020-03-24 10:14:03,444 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,444 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,444 [root] DEBUG: Loader: Injecting process 9280 (thread 9276) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,444 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,444 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,444 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,444 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,460 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9280
2020-03-24 10:14:03,476 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9348
2020-03-24 10:14:03,476 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,476 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,476 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,476 [root] DEBUG: Loader: Injecting process 9348 (thread 9400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,476 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,476 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,476 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,476 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,476 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9348
2020-03-24 10:14:03,492 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9348
2020-03-24 10:14:03,492 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,492 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,492 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,492 [root] DEBUG: Loader: Injecting process 9348 (thread 9400) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,507 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,523 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,523 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,523 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,523 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9348
2020-03-24 10:14:03,539 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9508
2020-03-24 10:14:03,539 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,539 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,539 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,539 [root] DEBUG: Loader: Injecting process 9508 (thread 9512) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,539 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,539 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,539 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,539 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,539 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9508
2020-03-24 10:14:03,553 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9508
2020-03-24 10:14:03,553 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,553 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,569 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,569 [root] DEBUG: Loader: Injecting process 9508 (thread 9512) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,569 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,569 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,569 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,569 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,569 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9508
2020-03-24 10:14:03,585 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9584
2020-03-24 10:14:03,585 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,585 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,585 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,585 [root] DEBUG: Loader: Injecting process 9584 (thread 9580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,585 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,585 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,585 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,585 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,585 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9584
2020-03-24 10:14:03,601 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9584
2020-03-24 10:14:03,601 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,601 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,601 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,601 [root] DEBUG: Loader: Injecting process 9584 (thread 9580) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,617 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,617 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,617 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,617 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,617 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9584
2020-03-24 10:14:03,631 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9760
2020-03-24 10:14:03,631 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,631 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,631 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,631 [root] DEBUG: Loader: Injecting process 9760 (thread 9756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,631 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,631 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,631 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,631 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,631 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9760
2020-03-24 10:14:03,648 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9760
2020-03-24 10:14:03,648 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,648 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,664 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,664 [root] DEBUG: Loader: Injecting process 9760 (thread 9756) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,664 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,664 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,664 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,664 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,664 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9760
2020-03-24 10:14:03,678 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9860
2020-03-24 10:14:03,678 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,678 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,678 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,678 [root] DEBUG: Loader: Injecting process 9860 (thread 9856) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,678 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,678 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,678 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,678 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,678 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9860
2020-03-24 10:14:03,694 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9860
2020-03-24 10:14:03,694 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,694 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,694 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,694 [root] DEBUG: Loader: Injecting process 9860 (thread 9856) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,710 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,710 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,710 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,710 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,710 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9860
2020-03-24 10:14:03,726 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9924
2020-03-24 10:14:03,726 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,726 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,726 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,726 [root] DEBUG: Loader: Injecting process 9924 (thread 9976) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,726 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,726 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,726 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,726 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,742 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9924
2020-03-24 10:14:03,742 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9924
2020-03-24 10:14:03,742 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,742 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,756 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,756 [root] DEBUG: Loader: Injecting process 9924 (thread 9976) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,756 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,756 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,756 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,756 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,756 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9924
2020-03-24 10:14:03,773 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10084
2020-03-24 10:14:03,773 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,773 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,773 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,773 [root] DEBUG: Loader: Injecting process 10084 (thread 10088) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,773 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,773 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,773 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,773 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,773 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10084
2020-03-24 10:14:03,788 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10084
2020-03-24 10:14:03,788 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,788 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,788 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,788 [root] DEBUG: Loader: Injecting process 10084 (thread 10088) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,803 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,803 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,803 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,803 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,803 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10084
2020-03-24 10:14:03,819 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10160
2020-03-24 10:14:03,819 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,819 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,819 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,819 [root] DEBUG: Loader: Injecting process 10160 (thread 10156) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,819 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,819 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,819 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,819 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,819 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10160
2020-03-24 10:14:03,835 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10160
2020-03-24 10:14:03,835 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,835 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,851 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,851 [root] DEBUG: Loader: Injecting process 10160 (thread 10156) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,851 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,851 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,851 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,851 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,851 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10160
2020-03-24 10:14:03,865 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9324
2020-03-24 10:14:03,865 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,865 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,865 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,865 [root] DEBUG: Loader: Injecting process 9324 (thread 9320) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,865 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,865 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,865 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,865 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,865 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9324
2020-03-24 10:14:03,881 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9324
2020-03-24 10:14:03,881 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,881 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,881 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,898 [root] DEBUG: Loader: Injecting process 9324 (thread 9320) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,898 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,898 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,898 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,898 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,898 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9324
2020-03-24 10:14:03,913 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9424
2020-03-24 10:14:03,913 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,913 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,913 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,913 [root] DEBUG: Loader: Injecting process 9424 (thread 9456) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,913 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,913 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,913 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,913 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,913 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9424
2020-03-24 10:14:03,928 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9424
2020-03-24 10:14:03,928 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,928 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,944 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,944 [root] DEBUG: Loader: Injecting process 9424 (thread 9456) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,944 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,944 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,944 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,944 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,944 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9424
2020-03-24 10:14:03,960 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9488
2020-03-24 10:14:03,960 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,960 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,960 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,960 [root] DEBUG: Loader: Injecting process 9488 (thread 9592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,960 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,960 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,960 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,960 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,960 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9488
2020-03-24 10:14:03,976 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9488
2020-03-24 10:14:03,976 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,976 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:03,976 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:03,976 [root] DEBUG: Loader: Injecting process 9488 (thread 9592) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,976 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,976 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,976 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,976 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:03,990 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9488
2020-03-24 10:14:04,006 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9680
2020-03-24 10:14:04,006 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,006 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,006 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,006 [root] DEBUG: Loader: Injecting process 9680 (thread 9676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,006 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,006 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,006 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,006 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,006 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9680
2020-03-24 10:14:04,022 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9680
2020-03-24 10:14:04,022 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,022 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,022 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,022 [root] DEBUG: Loader: Injecting process 9680 (thread 9676) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,022 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,038 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,038 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,038 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,038 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9680
2020-03-24 10:14:04,053 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9780
2020-03-24 10:14:04,053 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,053 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,053 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,053 [root] DEBUG: Loader: Injecting process 9780 (thread 9804) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,053 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,053 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,053 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,053 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,053 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9780
2020-03-24 10:14:04,069 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9780
2020-03-24 10:14:04,069 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,069 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,069 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,069 [root] DEBUG: Loader: Injecting process 9780 (thread 9804) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,069 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,069 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,069 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,069 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,069 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9780
2020-03-24 10:14:04,099 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9972
2020-03-24 10:14:04,099 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,099 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,099 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,099 [root] DEBUG: Loader: Injecting process 9972 (thread 9968) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,099 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,099 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,099 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,099 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,099 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9972
2020-03-24 10:14:04,115 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9972
2020-03-24 10:14:04,115 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,115 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,115 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,115 [root] DEBUG: Loader: Injecting process 9972 (thread 9968) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,115 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,115 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,131 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,131 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,131 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9972
2020-03-24 10:14:04,147 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10140
2020-03-24 10:14:04,147 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,147 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,147 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,147 [root] DEBUG: Loader: Injecting process 10140 (thread 10144) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,147 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,147 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,147 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,147 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,147 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10140
2020-03-24 10:14:04,163 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10140
2020-03-24 10:14:04,163 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,163 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,163 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,163 [root] DEBUG: Loader: Injecting process 10140 (thread 10144) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,163 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,163 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,177 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,177 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,177 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10140
2020-03-24 10:14:04,194 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10224
2020-03-24 10:14:04,194 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,194 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,194 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,194 [root] DEBUG: Loader: Injecting process 10224 (thread 9268) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,194 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,194 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,210 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,210 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,210 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10224
2020-03-24 10:14:04,224 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10224
2020-03-24 10:14:04,224 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,224 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,224 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,224 [root] DEBUG: Loader: Injecting process 10224 (thread 9268) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,224 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,224 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,224 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,224 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,224 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10224
2020-03-24 10:14:04,240 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9396
2020-03-24 10:14:04,240 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,240 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,240 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,240 [root] DEBUG: Loader: Injecting process 9396 (thread 9392) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,240 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,240 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,240 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,240 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,240 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9396
2020-03-24 10:14:04,256 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9396
2020-03-24 10:14:04,256 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,256 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,256 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,256 [root] DEBUG: Loader: Injecting process 9396 (thread 9392) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,256 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,256 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,256 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,256 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,272 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9396
2020-03-24 10:14:04,288 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9504
2020-03-24 10:14:04,288 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,288 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,288 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,288 [root] DEBUG: Loader: Injecting process 9504 (thread 9460) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,288 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,288 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,288 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,288 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,288 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9504
2020-03-24 10:14:04,302 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9504
2020-03-24 10:14:04,319 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,319 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,319 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,319 [root] DEBUG: Loader: Injecting process 9504 (thread 9460) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,319 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,319 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,319 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,319 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,319 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9504
2020-03-24 10:14:04,334 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9712
2020-03-24 10:14:04,334 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,334 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,334 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,334 [root] DEBUG: Loader: Injecting process 9712 (thread 9740) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,334 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,334 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,334 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,334 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,334 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9712
2020-03-24 10:14:04,349 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9712
2020-03-24 10:14:04,349 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,349 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,365 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,365 [root] DEBUG: Loader: Injecting process 9712 (thread 9740) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,365 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,365 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,365 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,365 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,365 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9712
2020-03-24 10:14:04,381 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9880
2020-03-24 10:14:04,381 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,381 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,381 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,381 [root] DEBUG: Loader: Injecting process 9880 (thread 9828) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,381 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,381 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,381 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,397 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,397 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9880
2020-03-24 10:14:04,397 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9880
2020-03-24 10:14:04,397 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,397 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,411 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,411 [root] DEBUG: Loader: Injecting process 9880 (thread 9828) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,411 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,411 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,411 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,411 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,411 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9880
2020-03-24 10:14:04,427 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10000
2020-03-24 10:14:04,427 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,427 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,427 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,427 [root] DEBUG: Loader: Injecting process 10000 (thread 10040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,427 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,427 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,427 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,427 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,427 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10000
2020-03-24 10:14:04,444 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10000
2020-03-24 10:14:04,444 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,444 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,444 [root] DEBUG: Loader: Injecting process 10000 (thread 10040) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,444 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,459 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,459 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,459 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,459 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10000
2020-03-24 10:14:04,474 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10216
2020-03-24 10:14:04,474 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,474 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,474 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,474 [root] DEBUG: Loader: Injecting process 10216 (thread 10228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,474 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,474 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,474 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,474 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,474 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10216
2020-03-24 10:14:04,490 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10216
2020-03-24 10:14:04,490 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,490 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,490 [root] DEBUG: Loader: Injecting process 10216 (thread 10228) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,490 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,490 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,490 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,490 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,506 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10216
2020-03-24 10:14:04,522 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9368
2020-03-24 10:14:04,522 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,522 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,522 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,522 [root] DEBUG: Loader: Injecting process 9368 (thread 9364) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,522 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,522 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,522 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,522 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,522 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9368
2020-03-24 10:14:04,536 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9368
2020-03-24 10:14:04,552 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,552 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,552 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,552 [root] DEBUG: Loader: Injecting process 9368 (thread 9364) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,552 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,552 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,552 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,552 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,552 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9368
2020-03-24 10:14:04,568 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9604
2020-03-24 10:14:04,568 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,568 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,568 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,568 [root] DEBUG: Loader: Injecting process 9604 (thread 9608) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,568 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,568 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,568 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,568 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,568 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9604
2020-03-24 10:14:04,584 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9604
2020-03-24 10:14:04,584 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,584 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,584 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,584 [root] DEBUG: Loader: Injecting process 9604 (thread 9608) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,584 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,599 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,599 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,599 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,599 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9604
2020-03-24 10:14:04,615 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9808
2020-03-24 10:14:04,615 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,615 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,615 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,615 [root] DEBUG: Loader: Injecting process 9808 (thread 9840) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,615 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,615 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,615 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,615 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,615 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9808
2020-03-24 10:14:04,631 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9808
2020-03-24 10:14:04,631 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,631 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,631 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,631 [root] DEBUG: Loader: Injecting process 9808 (thread 9840) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,631 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,631 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,645 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,645 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,645 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9808
2020-03-24 10:14:04,661 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9888
2020-03-24 10:14:04,661 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,661 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,661 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,661 [root] DEBUG: Loader: Injecting process 9888 (thread 9988) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,661 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,661 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,661 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,661 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,661 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9888
2020-03-24 10:14:04,677 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9888
2020-03-24 10:14:04,677 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,677 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,693 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,693 [root] DEBUG: Loader: Injecting process 9888 (thread 9988) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,693 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,693 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,693 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,693 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,693 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9888
2020-03-24 10:14:04,709 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10064
2020-03-24 10:14:04,709 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,709 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,709 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,709 [root] DEBUG: Loader: Injecting process 10064 (thread 8496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,709 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,709 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,709 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,709 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,709 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10064
2020-03-24 10:14:04,723 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10064
2020-03-24 10:14:04,723 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,723 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,723 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,723 [root] DEBUG: Loader: Injecting process 10064 (thread 8496) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,740 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,740 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,740 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,740 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,740 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10064
2020-03-24 10:14:04,756 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9224
2020-03-24 10:14:04,756 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,756 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,756 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,756 [root] DEBUG: Loader: Injecting process 9224 (thread 9304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,756 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,756 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,756 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,756 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,756 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9224
2020-03-24 10:14:04,770 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9224
2020-03-24 10:14:04,770 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,770 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,786 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,786 [root] DEBUG: Loader: Injecting process 9224 (thread 9304) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,786 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,786 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,786 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,786 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,786 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9224
2020-03-24 10:14:04,802 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9544
2020-03-24 10:14:04,802 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,802 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,802 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,802 [root] DEBUG: Loader: Injecting process 9544 (thread 9540) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,802 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,802 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,802 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,802 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,802 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9544
2020-03-24 10:14:04,818 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9544
2020-03-24 10:14:04,818 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,818 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,818 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,818 [root] DEBUG: Loader: Injecting process 9544 (thread 9540) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,818 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,818 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,818 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,834 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,834 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9544
2020-03-24 10:14:04,848 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9736
2020-03-24 10:14:04,848 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,848 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,848 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,848 [root] DEBUG: Loader: Injecting process 9736 (thread 9744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,848 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,865 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,865 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,865 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,865 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9736
2020-03-24 10:14:04,880 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9736
2020-03-24 10:14:04,880 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,880 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,880 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,880 [root] DEBUG: Loader: Injecting process 9736 (thread 9744) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,895 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,895 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,895 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,895 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,895 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9736
2020-03-24 10:14:04,911 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10028
2020-03-24 10:14:04,911 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,911 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,927 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,927 [root] DEBUG: Loader: Injecting process 10028 (thread 10168) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,927 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,927 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,927 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,927 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,927 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10028
2020-03-24 10:14:04,943 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10028
2020-03-24 10:14:04,943 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,943 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,957 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,957 [root] DEBUG: Loader: Injecting process 10028 (thread 10168) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,957 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,957 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,957 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,957 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,957 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10028
2020-03-24 10:14:04,973 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9288
2020-03-24 10:14:04,973 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,973 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:04,973 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:04,973 [root] DEBUG: Loader: Injecting process 9288 (thread 9308) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,973 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,990 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,990 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,990 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:04,990 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9288
2020-03-24 10:14:05,005 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9288
2020-03-24 10:14:05,005 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,005 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:05,005 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:05,005 [root] DEBUG: Loader: Injecting process 9288 (thread 9308) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,005 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,005 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,005 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,005 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,005 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9288
2020-03-24 10:14:05,020 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9412
2020-03-24 10:14:05,020 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,020 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:05,020 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:05,036 [root] DEBUG: Loader: Injecting process 9412 (thread 9480) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,036 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,036 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,036 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,036 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,036 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9412
2020-03-24 10:14:05,052 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9412
2020-03-24 10:14:05,052 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,052 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:05,052 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:05,068 [root] DEBUG: Loader: Injecting process 9412 (thread 9480) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,068 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,068 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,068 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,068 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:05,068 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9412
2020-03-24 10:14:05,082 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9868
2020-03-24 10:14:08,094 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,094 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:08,094 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:08,094 [root] DEBUG: Loader: Injecting process 9868 (thread 9952) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:08,094 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,094 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:08,094 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,094 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:08,094 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9868
2020-03-24 10:14:08,109 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9868
2020-03-24 10:14:08,109 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,109 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:08,109 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:08,109 [root] DEBUG: Loader: Injecting process 9868 (thread 9952) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:08,109 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:08,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,125 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:08,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9868
2020-03-24 10:14:08,141 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10220
2020-03-24 10:14:11,135 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,135 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:11,135 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:11,135 [root] DEBUG: Loader: Injecting process 10220 (thread 10048) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,135 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,135 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,135 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:11,135 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,135 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10220
2020-03-24 10:14:11,151 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10220
2020-03-24 10:14:11,151 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,151 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:11,167 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:11,167 [root] DEBUG: Loader: Injecting process 10220 (thread 10048) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,167 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,167 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,167 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:11,167 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,167 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10220
2020-03-24 10:14:11,183 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9452
2020-03-24 10:14:11,183 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,183 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:11,183 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:11,183 [root] DEBUG: Loader: Injecting process 9452 (thread 9468) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,183 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,183 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,183 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:11,183 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,183 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9452
2020-03-24 10:14:11,197 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9452
2020-03-24 10:14:11,197 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,197 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:11,213 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:11,213 [root] DEBUG: Loader: Injecting process 9452 (thread 9468) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,213 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,213 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,213 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:11,213 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:11,213 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9452
2020-03-24 10:14:11,230 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9772
2020-03-24 10:14:14,240 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:14,240 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:14,240 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:14,240 [root] DEBUG: Loader: Injecting process 9772 (thread 9696) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,240 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:14,240 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,240 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:14,240 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,240 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9772
2020-03-24 10:14:14,256 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9772
2020-03-24 10:14:14,256 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:14,256 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:14,272 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:14,272 [root] DEBUG: Loader: Injecting process 9772 (thread 9696) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,272 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:14,272 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,272 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:14,272 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,272 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9772
2020-03-24 10:14:14,286 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9992
2020-03-24 10:14:14,286 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:14,286 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:14,286 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:14,286 [root] DEBUG: Loader: Injecting process 9992 (thread 9996) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,286 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:14,286 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,286 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:14,286 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,286 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9992
2020-03-24 10:14:14,302 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9992
2020-03-24 10:14:14,302 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:14,302 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:14,318 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:14,318 [root] DEBUG: Loader: Injecting process 9992 (thread 9996) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,318 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:14,318 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,318 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:14,318 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:14,318 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9992
2020-03-24 10:14:14,334 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9500
2020-03-24 10:14:23,351 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,351 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:23,351 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:23,351 [root] DEBUG: Loader: Injecting process 9500 (thread 9384) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,351 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,351 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,351 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:23,351 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,351 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9500
2020-03-24 10:14:23,365 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9500
2020-03-24 10:14:23,365 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,365 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:23,381 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:23,381 [root] DEBUG: Loader: Injecting process 9500 (thread 9384) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,381 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,381 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,381 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:23,381 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,381 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9500
2020-03-24 10:14:23,398 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9928
2020-03-24 10:14:23,398 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,398 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:23,398 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:23,398 [root] DEBUG: Loader: Injecting process 9928 (thread 9944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,398 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,398 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,398 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:23,398 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,398 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9928
2020-03-24 10:14:23,413 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9928
2020-03-24 10:14:23,413 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,413 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:23,413 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:23,413 [root] DEBUG: Loader: Injecting process 9928 (thread 9944) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,413 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,413 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,413 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:23,413 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:23,413 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9928
2020-03-24 10:14:23,444 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10116
2020-03-24 10:14:26,454 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,454 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:26,454 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:26,454 [root] DEBUG: Loader: Injecting process 10116 (thread 9360) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,454 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,454 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,454 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:26,454 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,454 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10116
2020-03-24 10:14:26,470 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 10116
2020-03-24 10:14:26,470 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,470 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:26,470 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:26,470 [root] DEBUG: Loader: Injecting process 10116 (thread 9360) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,470 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,470 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,470 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:26,470 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,486 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10116
2020-03-24 10:14:26,502 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2856
2020-03-24 10:14:26,502 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,502 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:26,502 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:26,502 [root] DEBUG: Loader: Injecting process 2856 (thread 2932) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,502 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,502 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,502 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:26,502 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,502 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2856
2020-03-24 10:14:26,517 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 2856
2020-03-24 10:14:26,517 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,517 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:26,532 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:26,532 [root] DEBUG: Loader: Injecting process 2856 (thread 2932) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,532 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,532 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,532 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:26,532 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:26,532 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2856
2020-03-24 10:14:26,549 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9900
2020-03-24 10:14:35,549 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,549 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:35,549 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:35,549 [root] DEBUG: Loader: Injecting process 9900 (thread 9640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,549 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,549 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,549 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:35,549 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,549 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9900
2020-03-24 10:14:35,565 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9900
2020-03-24 10:14:35,565 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,565 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:35,565 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:35,565 [root] DEBUG: Loader: Injecting process 9900 (thread 9640) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,565 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,565 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,565 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:35,565 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,581 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9900
2020-03-24 10:14:35,596 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9444
2020-03-24 10:14:35,596 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,596 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:35,596 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:35,596 [root] DEBUG: Loader: Injecting process 9444 (thread 9448) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,596 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,596 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,611 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:35,611 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9444
2020-03-24 10:14:35,628 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9444
2020-03-24 10:14:35,628 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,628 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:35,628 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:35,628 [root] DEBUG: Loader: Injecting process 9444 (thread 9448) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,628 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,628 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,628 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:35,628 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:35,628 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9444
2020-03-24 10:14:35,644 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9664
2020-03-24 10:14:38,654 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,654 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:38,654 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:38,654 [root] DEBUG: Loader: Injecting process 9664 (thread 2188) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,654 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,654 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,654 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:38,654 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,654 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9664
2020-03-24 10:14:38,670 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9664
2020-03-24 10:14:38,670 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,670 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:38,686 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:38,686 [root] DEBUG: Loader: Injecting process 9664 (thread 2188) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,686 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,686 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,686 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:38,686 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,686 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9664
2020-03-24 10:14:38,700 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9668
2020-03-24 10:14:38,700 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,700 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:38,700 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:38,700 [root] DEBUG: Loader: Injecting process 9668 (thread 8700) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,700 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,700 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,700 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:38,700 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,700 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9668
2020-03-24 10:14:38,717 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9668
2020-03-24 10:14:38,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:38,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:38,717 [root] DEBUG: Loader: Injecting process 9668 (thread 8700) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,717 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:38,717 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:38,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9668
2020-03-24 10:14:38,732 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9300
2020-03-24 10:14:47,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:47,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:47,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:47,765 [root] DEBUG: Loader: Injecting process 9300 (thread 2036) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:47,765 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:47,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:47,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:47,765 [root] DEBUG: Successfully injected DLL C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:47,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9300
2020-03-24 10:14:47,796 [root] INFO: Announced 32-bit process name: LHL6gxb1Om7mn2m.exe pid: 9300
2020-03-24 10:14:47,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:47,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\edjcn\dll\ImLclg.dll, loader C:\edjcn\bin\RpEElQK.exe
2020-03-24 10:14:47,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\rVaCts.
2020-03-24 10:14:47,796 [root] DEBUG: Loader: Injecting process 9300 (thread 2036) with C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:47,796 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:47,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\edjcn\dll\ImLclg.dll.
2020-03-24 10:14:47,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
202