Analysis

Category Package Started Completed Duration Options Log
FILE exe 2020-03-24 10:13:10 2020-03-24 10:17:15 245 seconds Show Options Show Log
route = internet
procdump = 1
2020-03-24 10:13:22,000 [root] INFO: Date set to: 03-24-20, time set to: 10:13:22, timeout set to: 200
2020-03-24 10:13:22,078 [root] DEBUG: Starting analyzer from: C:\xecgmpuhuy
2020-03-24 10:13:22,078 [root] DEBUG: Storing results at: C:\ohDlfTRA
2020-03-24 10:13:22,078 [root] DEBUG: Pipe server name: \\.\PIPE\cAcfwi
2020-03-24 10:13:22,078 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-03-24 10:13:22,078 [root] INFO: Automatically selected analysis package "exe"
2020-03-24 10:13:28,441 [root] DEBUG: Started auxiliary module Browser
2020-03-24 10:13:28,441 [root] DEBUG: Started auxiliary module Curtain
2020-03-24 10:13:28,441 [modules.auxiliary.digisig] DEBUG: Checking for a digitial signature.
2020-03-24 10:13:29,628 [modules.auxiliary.digisig] DEBUG: File is not signed.
2020-03-24 10:13:29,628 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2020-03-24 10:13:29,628 [root] DEBUG: Started auxiliary module DigiSig
2020-03-24 10:13:29,644 [root] DEBUG: Started auxiliary module Disguise
2020-03-24 10:13:29,644 [root] DEBUG: Started auxiliary module Human
2020-03-24 10:13:29,644 [root] DEBUG: Started auxiliary module Screenshots
2020-03-24 10:13:29,644 [root] DEBUG: Started auxiliary module Sysmon
2020-03-24 10:13:29,658 [root] DEBUG: Started auxiliary module Usage
2020-03-24 10:13:29,658 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option
2020-03-24 10:13:29,658 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option
2020-03-24 10:13:29,690 [lib.api.process] INFO: Successfully executed process from path "C:\Users\user\AppData\Local\Temp\ANIIaZ.exe" with arguments "" with pid 1420
2020-03-24 10:13:29,690 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:29,690 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:29,721 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:29,721 [root] DEBUG: Loader: Injecting process 1420 (thread 1312) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:29,721 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:29,721 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:29,721 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:29,736 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:29,736 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1420
2020-03-24 10:13:31,750 [lib.api.process] INFO: Successfully resumed process with pid 1420
2020-03-24 10:13:31,750 [root] INFO: Added new process to list with pid: 1420
2020-03-24 10:13:31,905 [root] DEBUG: Terminate processes on terminate_event enabled.
2020-03-24 10:13:31,921 [root] DEBUG: Process dumps enabled.
2020-03-24 10:13:32,015 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-03-24 10:13:32,015 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:32,015 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:32,015 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:32,015 [root] INFO: Disabling sleep skipping.
2020-03-24 10:13:32,015 [root] DEBUG: CAPE initialised: 32-bit base package loaded in process 1420 at 0x74b50000, image base 0x400000, stack from 0x186000-0x190000
2020-03-24 10:13:32,029 [root] DEBUG: Commandline: C:\Users\user\AppData\Local\Temp\"C:\Users\user\AppData\Local\Temp\ANIIaZ.exe".
2020-03-24 10:13:32,029 [root] INFO: Monitor successfully loaded in process with pid 1420.
2020-03-24 10:13:32,186 [root] DEBUG: DLL loaded at 0x74AF0000: C:\Windows\system32\SXS (0x5f000 bytes).
2020-03-24 10:13:34,494 [root] DEBUG: set_caller_info: Adding region at 0x00410000 to caller regions list (ntdll::LdrLoadDll).
2020-03-24 10:13:34,697 [root] DEBUG: DLL loaded at 0x76430000: C:\Windows\syswow64\shell32 (0xc4a000 bytes).
2020-03-24 10:13:34,744 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1964
2020-03-24 10:13:34,744 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:34,744 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:34,744 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:34,759 [root] DEBUG: Loader: Injecting process 1964 (thread 1520) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,759 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:34,759 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,759 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:34,759 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,759 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1964
2020-03-24 10:13:34,759 [root] DEBUG: DLL loaded at 0x74DC0000: C:\Windows\system32\apphelp (0x4c000 bytes).
2020-03-24 10:13:34,806 [root] DEBUG: DLL unloaded from 0x00400000.
2020-03-24 10:13:34,806 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1964
2020-03-24 10:13:34,806 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:34,806 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:34,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:34,822 [root] DEBUG: Loader: Injecting process 1964 (thread 1520) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:34,838 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,838 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:34,838 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,838 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1964
2020-03-24 10:13:34,854 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1600
2020-03-24 10:13:34,854 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:34,854 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:34,869 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:34,869 [root] DEBUG: Loader: Injecting process 1600 (thread 1288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,869 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:34,869 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,869 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:34,869 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,869 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1600
2020-03-24 10:13:34,915 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1600
2020-03-24 10:13:34,915 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:34,915 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:34,931 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:34,931 [root] DEBUG: Loader: Injecting process 1600 (thread 1288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,931 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:34,931 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,931 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:34,931 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,931 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1600
2020-03-24 10:13:34,963 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1068
2020-03-24 10:13:34,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:34,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:34,979 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:34,979 [root] DEBUG: Loader: Injecting process 1068 (thread 1448) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,979 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:34,979 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,979 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:34,979 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:34,993 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1068
2020-03-24 10:13:35,026 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1068
2020-03-24 10:13:35,026 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,026 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,040 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,040 [root] DEBUG: Loader: Injecting process 1068 (thread 1448) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,040 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,040 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,040 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,040 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,056 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1068
2020-03-24 10:13:35,072 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1740
2020-03-24 10:13:35,072 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,072 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,088 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,088 [root] DEBUG: Loader: Injecting process 1740 (thread 1752) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,088 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,088 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,088 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,104 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,104 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1740
2020-03-24 10:13:35,134 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1740
2020-03-24 10:13:35,134 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,134 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,150 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,150 [root] DEBUG: Loader: Injecting process 1740 (thread 1752) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,150 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,150 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,165 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,165 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,165 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1740
2020-03-24 10:13:35,181 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 332
2020-03-24 10:13:35,181 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,181 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,197 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,197 [root] DEBUG: Loader: Injecting process 332 (thread 1316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,197 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,197 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,197 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,197 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,197 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 332
2020-03-24 10:13:35,243 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 332
2020-03-24 10:13:35,243 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,243 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,259 [root] DEBUG: Loader: Injecting process 332 (thread 1316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,259 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,259 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 332
2020-03-24 10:13:35,338 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1932
2020-03-24 10:13:35,338 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,338 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,352 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,352 [root] DEBUG: Loader: Injecting process 1932 (thread 1456) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,352 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,352 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,352 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,352 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,368 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1932
2020-03-24 10:13:35,415 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1932
2020-03-24 10:13:35,415 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,415 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,430 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,430 [root] DEBUG: Loader: Injecting process 1932 (thread 1456) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,430 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,430 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,447 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,447 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,447 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1932
2020-03-24 10:13:35,461 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1000
2020-03-24 10:13:35,461 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,461 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,477 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,477 [root] DEBUG: Loader: Injecting process 1000 (thread 884) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,477 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,477 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,477 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,477 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,477 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1000
2020-03-24 10:13:35,525 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1000
2020-03-24 10:13:35,525 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,525 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,539 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,539 [root] DEBUG: Loader: Injecting process 1000 (thread 884) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,539 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,539 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,539 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,539 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,539 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1000
2020-03-24 10:13:35,555 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1376
2020-03-24 10:13:35,555 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,555 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,572 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,572 [root] DEBUG: Loader: Injecting process 1376 (thread 1952) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,572 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,572 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,572 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,572 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,586 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1376
2020-03-24 10:13:35,618 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1376
2020-03-24 10:13:35,618 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,618 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,634 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,634 [root] DEBUG: Loader: Injecting process 1376 (thread 1952) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,634 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,634 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,650 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,650 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,650 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1376
2020-03-24 10:13:35,664 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1780
2020-03-24 10:13:35,664 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,664 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,664 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,664 [root] DEBUG: Loader: Injecting process 1780 (thread 1908) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,680 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,680 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,680 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,680 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,680 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1780
2020-03-24 10:13:35,727 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1780
2020-03-24 10:13:35,727 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,727 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,743 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,743 [root] DEBUG: Loader: Injecting process 1780 (thread 1908) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,743 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,743 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,743 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,743 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,743 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1780
2020-03-24 10:13:35,773 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2120
2020-03-24 10:13:35,773 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,773 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,789 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,789 [root] DEBUG: Loader: Injecting process 2120 (thread 2124) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,789 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,789 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,789 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,789 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,805 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2120
2020-03-24 10:13:35,836 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2120
2020-03-24 10:13:35,851 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,851 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,851 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,851 [root] DEBUG: Loader: Injecting process 2120 (thread 2124) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,868 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,868 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,868 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,868 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,868 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2120
2020-03-24 10:13:35,884 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2216
2020-03-24 10:13:35,884 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,884 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,898 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,898 [root] DEBUG: Loader: Injecting process 2216 (thread 2220) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,898 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,898 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,898 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:35,914 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,914 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2216
2020-03-24 10:13:35,946 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2216
2020-03-24 10:13:35,946 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,946 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:35,961 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:35,961 [root] DEBUG: Loader: Injecting process 2216 (thread 2220) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,961 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:35,961 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,961 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:35,976 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:35,976 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2216
2020-03-24 10:13:35,993 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2312
2020-03-24 10:13:35,993 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:35,993 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,007 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,007 [root] DEBUG: Loader: Injecting process 2312 (thread 2316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,007 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,007 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,007 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,007 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,007 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2312
2020-03-24 10:13:36,055 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2312
2020-03-24 10:13:36,055 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,055 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,055 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,055 [root] DEBUG: Loader: Injecting process 2312 (thread 2316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,071 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,071 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,071 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,071 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,071 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2312
2020-03-24 10:13:36,085 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2408
2020-03-24 10:13:36,085 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,085 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,101 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,101 [root] DEBUG: Loader: Injecting process 2408 (thread 2412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,101 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,101 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,101 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,101 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,101 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2408
2020-03-24 10:13:36,148 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2408
2020-03-24 10:13:36,148 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,148 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,164 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,164 [root] DEBUG: Loader: Injecting process 2408 (thread 2412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,164 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,164 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,164 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,164 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,164 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2408
2020-03-24 10:13:36,196 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2504
2020-03-24 10:13:36,196 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,196 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,210 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,210 [root] DEBUG: Loader: Injecting process 2504 (thread 2508) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,210 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,210 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,210 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,210 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2504
2020-03-24 10:13:36,257 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2504
2020-03-24 10:13:36,257 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,273 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,273 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,273 [root] DEBUG: Loader: Injecting process 2504 (thread 2508) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,273 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,289 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,289 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,289 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,289 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2504
2020-03-24 10:13:36,305 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2600
2020-03-24 10:13:36,305 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,305 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,319 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,319 [root] DEBUG: Loader: Injecting process 2600 (thread 2604) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,319 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,319 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,319 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,367 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,382 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2600
2020-03-24 10:13:36,414 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2600
2020-03-24 10:13:36,414 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,414 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,444 [root] DEBUG: Loader: Injecting process 2600 (thread 2604) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,444 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,444 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,444 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,444 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,460 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2600
2020-03-24 10:13:36,476 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2704
2020-03-24 10:13:36,476 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,476 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,476 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,492 [root] DEBUG: Loader: Injecting process 2704 (thread 2708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,492 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,507 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,507 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,507 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,507 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2704
2020-03-24 10:13:36,553 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2704
2020-03-24 10:13:36,553 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,553 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,569 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,569 [root] DEBUG: Loader: Injecting process 2704 (thread 2708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,569 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,569 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,585 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,585 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,585 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2704
2020-03-24 10:13:36,617 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2800
2020-03-24 10:13:36,617 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,617 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,631 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,631 [root] DEBUG: Loader: Injecting process 2800 (thread 2804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,631 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,631 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,631 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,631 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,631 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2800
2020-03-24 10:13:36,678 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2800
2020-03-24 10:13:36,678 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,678 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,694 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,694 [root] DEBUG: Loader: Injecting process 2800 (thread 2804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,694 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,694 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,694 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,710 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,710 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2800
2020-03-24 10:13:36,726 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2896
2020-03-24 10:13:36,726 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,726 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,742 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,742 [root] DEBUG: Loader: Injecting process 2896 (thread 2900) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,742 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,742 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,742 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,756 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,756 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2896
2020-03-24 10:13:36,803 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2896
2020-03-24 10:13:36,803 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,803 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,803 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,803 [root] DEBUG: Loader: Injecting process 2896 (thread 2900) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,819 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,819 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,819 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,819 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,819 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2896
2020-03-24 10:13:36,835 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2992
2020-03-24 10:13:36,835 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,835 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,851 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,851 [root] DEBUG: Loader: Injecting process 2992 (thread 2996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,851 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,851 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,851 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,851 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,865 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2992
2020-03-24 10:13:36,898 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2992
2020-03-24 10:13:36,898 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,898 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,913 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,913 [root] DEBUG: Loader: Injecting process 2992 (thread 2996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,913 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,913 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,913 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:36,913 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,928 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2992
2020-03-24 10:13:36,944 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2068
2020-03-24 10:13:36,944 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:36,944 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:36,960 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:36,960 [root] DEBUG: Loader: Injecting process 2068 (thread 2072) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,960 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:36,960 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,960 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:36,960 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:36,960 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2068
2020-03-24 10:13:37,006 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2068
2020-03-24 10:13:37,006 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,022 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,022 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,038 [root] DEBUG: Loader: Injecting process 2068 (thread 2072) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,038 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,038 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,038 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,038 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,038 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2068
2020-03-24 10:13:37,069 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2136
2020-03-24 10:13:37,069 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,069 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,085 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,085 [root] DEBUG: Loader: Injecting process 2136 (thread 2188) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,085 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,085 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,085 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,099 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,099 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2136
2020-03-24 10:13:37,131 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2136
2020-03-24 10:13:37,131 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,131 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,147 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,163 [root] DEBUG: Loader: Injecting process 2136 (thread 2188) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,163 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,163 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,163 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,163 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,177 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2136
2020-03-24 10:13:37,194 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2296
2020-03-24 10:13:37,194 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,194 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,224 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,224 [root] DEBUG: Loader: Injecting process 2296 (thread 2300) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,224 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,224 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,224 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,240 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,240 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2296
2020-03-24 10:13:37,272 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2296
2020-03-24 10:13:37,272 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,272 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,288 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,288 [root] DEBUG: Loader: Injecting process 2296 (thread 2300) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,288 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,288 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,302 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,302 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,302 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2296
2020-03-24 10:13:37,319 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2372
2020-03-24 10:13:37,319 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,319 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,334 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,334 [root] DEBUG: Loader: Injecting process 2372 (thread 2368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,334 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,334 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,334 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,349 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,349 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2372
2020-03-24 10:13:37,427 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2372
2020-03-24 10:13:37,427 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,427 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,444 [root] DEBUG: Loader: Injecting process 2372 (thread 2368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,444 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,444 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,459 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,459 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,459 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2372
2020-03-24 10:13:37,474 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2532
2020-03-24 10:13:37,474 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,474 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,490 [root] DEBUG: Loader: Injecting process 2532 (thread 2536) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,490 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,490 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,490 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,490 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,490 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2532
2020-03-24 10:13:37,536 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2532
2020-03-24 10:13:37,536 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,536 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,552 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,552 [root] DEBUG: Loader: Injecting process 2532 (thread 2536) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,552 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,552 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,552 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,552 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,552 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2532
2020-03-24 10:13:37,568 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 112
2020-03-24 10:13:37,568 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,568 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,584 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,584 [root] DEBUG: Loader: Injecting process 112 (thread 2640) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,584 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,599 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,599 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,599 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,599 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 112
2020-03-24 10:13:37,645 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 112
2020-03-24 10:13:37,645 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,645 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,661 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,677 [root] DEBUG: Loader: Injecting process 112 (thread 2640) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,677 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,677 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,677 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,677 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,677 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 112
2020-03-24 10:13:37,693 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2680
2020-03-24 10:13:37,693 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,693 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,709 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,709 [root] DEBUG: Loader: Injecting process 2680 (thread 2684) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,709 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,709 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,709 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,709 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,723 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2680
2020-03-24 10:13:37,756 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2680
2020-03-24 10:13:37,756 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,756 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,770 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,770 [root] DEBUG: Loader: Injecting process 2680 (thread 2684) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,770 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,770 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,770 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,770 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,770 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2680
2020-03-24 10:13:37,802 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2792
2020-03-24 10:13:37,802 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,802 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,818 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,818 [root] DEBUG: Loader: Injecting process 2792 (thread 2768) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,818 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,818 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,834 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,834 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,834 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2792
2020-03-24 10:13:37,865 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2792
2020-03-24 10:13:37,865 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,865 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,880 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,880 [root] DEBUG: Loader: Injecting process 2792 (thread 2768) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,880 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,880 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,880 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,880 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,895 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2792
2020-03-24 10:13:37,911 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2852
2020-03-24 10:13:37,911 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,911 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,927 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,927 [root] DEBUG: Loader: Injecting process 2852 (thread 2892) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,927 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,927 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,927 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:37,927 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,927 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2852
2020-03-24 10:13:37,973 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2852
2020-03-24 10:13:37,973 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:37,973 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:37,973 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:37,990 [root] DEBUG: Loader: Injecting process 2852 (thread 2892) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,990 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:37,990 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,990 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:37,990 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:37,990 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2852
2020-03-24 10:13:38,020 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3028
2020-03-24 10:13:38,020 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,020 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,036 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,036 [root] DEBUG: Loader: Injecting process 3028 (thread 3032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,036 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,036 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,036 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,052 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,052 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3028
2020-03-24 10:13:38,098 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3028
2020-03-24 10:13:38,098 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,098 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,114 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,114 [root] DEBUG: Loader: Injecting process 3028 (thread 3032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,114 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,130 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,130 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,130 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,130 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3028
2020-03-24 10:13:38,145 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2096
2020-03-24 10:13:38,145 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,145 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,161 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,161 [root] DEBUG: Loader: Injecting process 2096 (thread 2092) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,161 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,161 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,161 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,177 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,177 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2096
2020-03-24 10:13:38,223 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2096
2020-03-24 10:13:38,223 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,223 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,223 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,239 [root] DEBUG: Loader: Injecting process 2096 (thread 2092) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,239 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,239 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,239 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,239 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,239 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2096
2020-03-24 10:13:38,255 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2240
2020-03-24 10:13:38,255 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,255 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,269 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,269 [root] DEBUG: Loader: Injecting process 2240 (thread 2236) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,269 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,269 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,269 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,286 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,286 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2240
2020-03-24 10:13:38,332 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2240
2020-03-24 10:13:38,332 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,332 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,348 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,348 [root] DEBUG: Loader: Injecting process 2240 (thread 2236) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,348 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,348 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,348 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,348 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,348 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2240
2020-03-24 10:13:38,364 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2400
2020-03-24 10:13:38,364 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,364 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,380 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,380 [root] DEBUG: Loader: Injecting process 2400 (thread 2328) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,380 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,380 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,380 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,380 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,394 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2400
2020-03-24 10:13:38,426 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2400
2020-03-24 10:13:38,426 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,441 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,441 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,441 [root] DEBUG: Loader: Injecting process 2400 (thread 2328) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,441 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,473 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,489 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,503 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,503 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2400
2020-03-24 10:13:38,519 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2484
2020-03-24 10:13:38,519 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,519 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,536 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,536 [root] DEBUG: Loader: Injecting process 2484 (thread 2480) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,536 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,536 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,536 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,536 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,536 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2484
2020-03-24 10:13:38,582 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2484
2020-03-24 10:13:38,582 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,582 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,582 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,582 [root] DEBUG: Loader: Injecting process 2484 (thread 2480) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,582 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,598 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,598 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,598 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,598 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2484
2020-03-24 10:13:38,628 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 260
2020-03-24 10:13:38,628 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,628 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,644 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,644 [root] DEBUG: Loader: Injecting process 260 (thread 1916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,644 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,644 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,644 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,660 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,660 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 260
2020-03-24 10:13:38,691 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 260
2020-03-24 10:13:38,691 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,691 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,707 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,707 [root] DEBUG: Loader: Injecting process 260 (thread 1916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,707 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,707 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,723 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,723 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,723 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 260
2020-03-24 10:13:38,737 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2736
2020-03-24 10:13:38,737 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,737 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,753 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,753 [root] DEBUG: Loader: Injecting process 2736 (thread 2740) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,753 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,753 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,769 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,769 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,769 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2736
2020-03-24 10:13:38,801 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2736
2020-03-24 10:13:38,801 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,815 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,832 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,832 [root] DEBUG: Loader: Injecting process 2736 (thread 2740) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,848 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,848 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,848 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,862 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,862 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2736
2020-03-24 10:13:38,878 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2756
2020-03-24 10:13:38,878 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,878 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,894 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,894 [root] DEBUG: Loader: Injecting process 2756 (thread 2876) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,894 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,894 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,910 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:38,910 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,910 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2756
2020-03-24 10:13:38,957 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2756
2020-03-24 10:13:38,957 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:38,957 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:38,971 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:38,971 [root] DEBUG: Loader: Injecting process 2756 (thread 2876) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,971 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:38,971 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,971 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:38,971 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:38,987 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2756
2020-03-24 10:13:39,003 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2948
2020-03-24 10:13:39,003 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,003 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,003 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,019 [root] DEBUG: Loader: Injecting process 2948 (thread 2988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,019 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,019 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,019 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,019 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,019 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2948
2020-03-24 10:13:39,065 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2948
2020-03-24 10:13:39,065 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,065 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,082 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,082 [root] DEBUG: Loader: Injecting process 2948 (thread 2988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,082 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,082 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,096 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,096 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,096 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2948
2020-03-24 10:13:39,112 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3048
2020-03-24 10:13:39,112 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,112 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,128 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,128 [root] DEBUG: Loader: Injecting process 3048 (thread 3052) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,128 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,128 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,128 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,128 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,128 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3048
2020-03-24 10:13:39,174 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3048
2020-03-24 10:13:39,174 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,174 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,190 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,190 [root] DEBUG: Loader: Injecting process 3048 (thread 3052) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,190 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,190 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,190 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,190 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,206 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3048
2020-03-24 10:13:39,221 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2252
2020-03-24 10:13:39,221 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,221 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,237 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,237 [root] DEBUG: Loader: Injecting process 2252 (thread 2248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,237 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,253 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,253 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,253 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,253 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2252
2020-03-24 10:13:39,283 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2252
2020-03-24 10:13:39,283 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,283 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,299 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,299 [root] DEBUG: Loader: Injecting process 2252 (thread 2248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,299 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,299 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,315 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,315 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,315 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2252
2020-03-24 10:13:39,331 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2456
2020-03-24 10:13:39,331 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,331 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,346 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,346 [root] DEBUG: Loader: Injecting process 2456 (thread 2428) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,346 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,346 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,346 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,346 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,346 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2456
2020-03-24 10:13:39,394 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2456
2020-03-24 10:13:39,394 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,394 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,408 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,408 [root] DEBUG: Loader: Injecting process 2456 (thread 2428) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,408 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,408 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,408 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,408 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,408 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2456
2020-03-24 10:13:39,424 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2524
2020-03-24 10:13:39,424 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,424 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,424 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,424 [root] DEBUG: Loader: Injecting process 2524 (thread 1708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,440 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,440 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,440 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,440 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,440 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2524
2020-03-24 10:13:39,486 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2524
2020-03-24 10:13:39,486 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,486 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,503 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,503 [root] DEBUG: Loader: Injecting process 2524 (thread 1708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,503 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,503 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,503 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,503 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,503 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2524
2020-03-24 10:13:39,581 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2664
2020-03-24 10:13:39,581 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,581 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,595 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,595 [root] DEBUG: Loader: Injecting process 2664 (thread 2660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,595 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,611 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,611 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,611 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2664
2020-03-24 10:13:39,658 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2664
2020-03-24 10:13:39,658 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,658 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,674 [root] DEBUG: Loader: Injecting process 2664 (thread 2660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,674 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,674 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,674 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,674 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,674 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2664
2020-03-24 10:13:39,706 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2788
2020-03-24 10:13:39,706 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,706 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,720 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,720 [root] DEBUG: Loader: Injecting process 2788 (thread 2744) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,720 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,720 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,720 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,720 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2788
2020-03-24 10:13:39,767 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2788
2020-03-24 10:13:39,767 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,767 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,767 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,767 [root] DEBUG: Loader: Injecting process 2788 (thread 2744) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,783 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,783 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,783 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,783 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,783 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2788
2020-03-24 10:13:39,799 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3024
2020-03-24 10:13:39,799 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,799 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,815 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,815 [root] DEBUG: Loader: Injecting process 3024 (thread 3060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,829 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,829 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,829 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,829 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,829 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3024
2020-03-24 10:13:39,877 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3024
2020-03-24 10:13:39,877 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,877 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,892 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,892 [root] DEBUG: Loader: Injecting process 3024 (thread 3060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,892 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,892 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,892 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:39,892 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,907 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3024
2020-03-24 10:13:39,924 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2160
2020-03-24 10:13:39,924 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,924 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:39,940 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:39,940 [root] DEBUG: Loader: Injecting process 2160 (thread 2156) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,940 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:39,940 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,940 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:39,940 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:39,940 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2160
2020-03-24 10:13:39,986 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2160
2020-03-24 10:13:39,986 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:39,986 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,002 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,002 [root] DEBUG: Loader: Injecting process 2160 (thread 2156) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,002 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,002 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,002 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,002 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,017 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2160
2020-03-24 10:13:40,032 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2340
2020-03-24 10:13:40,032 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,032 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,049 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,049 [root] DEBUG: Loader: Injecting process 2340 (thread 2352) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,049 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,049 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,049 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,063 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,063 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2340
2020-03-24 10:13:40,095 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2340
2020-03-24 10:13:40,095 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,095 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,111 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,111 [root] DEBUG: Loader: Injecting process 2340 (thread 2352) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,111 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,111 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,127 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,127 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,127 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2340
2020-03-24 10:13:40,141 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2552
2020-03-24 10:13:40,141 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,141 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,157 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,157 [root] DEBUG: Loader: Injecting process 2552 (thread 2548) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,157 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,157 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,157 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,157 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,157 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2552
2020-03-24 10:13:40,204 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2552
2020-03-24 10:13:40,204 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,204 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,220 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,220 [root] DEBUG: Loader: Injecting process 2552 (thread 2548) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,220 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,220 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,220 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,220 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,236 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2552
2020-03-24 10:13:40,252 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1924
2020-03-24 10:13:40,252 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,252 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,266 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,282 [root] DEBUG: Loader: Injecting process 1924 (thread 1724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,282 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,282 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,282 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,282 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,282 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1924
2020-03-24 10:13:40,329 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1924
2020-03-24 10:13:40,329 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,329 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,329 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,329 [root] DEBUG: Loader: Injecting process 1924 (thread 1724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,345 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,345 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,345 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,345 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,345 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1924
2020-03-24 10:13:40,361 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2820
2020-03-24 10:13:40,361 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,361 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,375 [root] DEBUG: Loader: Injecting process 2820 (thread 2856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,375 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,391 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,391 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,391 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,391 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2820
2020-03-24 10:13:40,438 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2820
2020-03-24 10:13:40,438 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,438 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,438 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,438 [root] DEBUG: Loader: Injecting process 2820 (thread 2856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,438 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,453 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2820
2020-03-24 10:13:40,470 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2104
2020-03-24 10:13:40,470 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,470 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,486 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,486 [root] DEBUG: Loader: Injecting process 2104 (thread 2108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,486 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,486 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,486 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,486 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,486 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2104
2020-03-24 10:13:40,532 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2104
2020-03-24 10:13:40,532 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,532 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,548 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,548 [root] DEBUG: Loader: Injecting process 2104 (thread 2108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,548 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,548 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,548 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,548 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,548 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2104
2020-03-24 10:13:40,625 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2168
2020-03-24 10:13:40,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,641 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,641 [root] DEBUG: Loader: Injecting process 2168 (thread 2288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,641 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,641 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,641 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,641 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,641 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2168
2020-03-24 10:13:40,687 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2168
2020-03-24 10:13:40,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,703 [root] DEBUG: Loader: Injecting process 2168 (thread 2288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,703 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,720 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,720 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,720 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2168
2020-03-24 10:13:40,734 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2360
2020-03-24 10:13:40,734 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,734 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,750 [root] DEBUG: Loader: Injecting process 2360 (thread 2584) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,750 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,750 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2360
2020-03-24 10:13:40,798 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2360
2020-03-24 10:13:40,798 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,798 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,798 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,812 [root] DEBUG: Loader: Injecting process 2360 (thread 2584) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,812 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,812 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2360
2020-03-24 10:13:40,828 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2592
2020-03-24 10:13:40,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,844 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,844 [root] DEBUG: Loader: Injecting process 2592 (thread 2596) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,844 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,859 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,859 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,859 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,859 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2592
2020-03-24 10:13:40,907 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2592
2020-03-24 10:13:40,907 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,907 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,921 [root] DEBUG: Loader: Injecting process 2592 (thread 2596) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,921 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:40,921 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2592
2020-03-24 10:13:40,953 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2868
2020-03-24 10:13:40,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:40,969 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:40,969 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:40,984 [root] DEBUG: Loader: Injecting process 2868 (thread 2872) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,984 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:40,984 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,984 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:40,984 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:40,984 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2868
2020-03-24 10:13:41,032 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2868
2020-03-24 10:13:41,032 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,032 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,046 [root] DEBUG: Loader: Injecting process 2868 (thread 2872) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,062 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,062 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2868
2020-03-24 10:13:41,094 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3012
2020-03-24 10:13:41,094 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,094 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,109 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,109 [root] DEBUG: Loader: Injecting process 3012 (thread 3016) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,109 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,125 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3012
2020-03-24 10:13:41,155 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3012
2020-03-24 10:13:41,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,171 [root] DEBUG: Loader: Injecting process 3012 (thread 3016) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,171 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,187 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3012
2020-03-24 10:13:41,203 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2380
2020-03-24 10:13:41,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,219 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,219 [root] DEBUG: Loader: Injecting process 2380 (thread 2472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,233 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,233 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2380
2020-03-24 10:13:41,280 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2380
2020-03-24 10:13:41,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,312 [root] DEBUG: Loader: Injecting process 2380 (thread 2472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,312 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,328 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2380
2020-03-24 10:13:41,344 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1324
2020-03-24 10:13:41,344 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,344 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,375 [root] DEBUG: Loader: Injecting process 1324 (thread 844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,375 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,390 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1324
2020-03-24 10:13:41,437 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1324
2020-03-24 10:13:41,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,453 [root] DEBUG: Loader: Injecting process 1324 (thread 844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,453 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,453 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1324
2020-03-24 10:13:41,483 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2696
2020-03-24 10:13:41,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,515 [root] DEBUG: Loader: Injecting process 2696 (thread 2828) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,515 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,515 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2696
2020-03-24 10:13:41,562 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2696
2020-03-24 10:13:41,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,592 [root] DEBUG: Loader: Injecting process 2696 (thread 2828) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,592 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,608 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2696
2020-03-24 10:13:41,687 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2140
2020-03-24 10:13:41,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,701 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,701 [root] DEBUG: Loader: Injecting process 2140 (thread 2208) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,701 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,701 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,717 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2140
2020-03-24 10:13:41,765 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2140
2020-03-24 10:13:41,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,779 [root] DEBUG: Loader: Injecting process 2140 (thread 2208) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,779 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,779 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,779 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,779 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,779 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2140
2020-03-24 10:13:41,812 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2492
2020-03-24 10:13:41,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,826 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,826 [root] DEBUG: Loader: Injecting process 2492 (thread 2580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,826 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,826 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,826 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,842 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2492
2020-03-24 10:13:41,890 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2492
2020-03-24 10:13:41,904 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,904 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,904 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,921 [root] DEBUG: Loader: Injecting process 2492 (thread 2580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,921 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:41,921 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2492
2020-03-24 10:13:41,951 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2424
2020-03-24 10:13:41,951 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:41,951 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:41,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:41,967 [root] DEBUG: Loader: Injecting process 2424 (thread 2724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,967 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:41,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:41,967 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:41,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2424
2020-03-24 10:13:42,029 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2424
2020-03-24 10:13:42,029 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,029 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,029 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,046 [root] DEBUG: Loader: Injecting process 2424 (thread 2724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,046 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,046 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2424
2020-03-24 10:13:42,076 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2936
2020-03-24 10:13:42,076 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,076 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,092 [root] DEBUG: Loader: Injecting process 2936 (thread 2064) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,092 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,108 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2936
2020-03-24 10:13:42,154 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2936
2020-03-24 10:13:42,154 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,154 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,170 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,170 [root] DEBUG: Loader: Injecting process 2936 (thread 2064) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,170 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,186 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,186 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,186 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,186 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2936
2020-03-24 10:13:42,217 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2204
2020-03-24 10:13:42,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,247 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,247 [root] DEBUG: Loader: Injecting process 2204 (thread 2264) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,247 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,247 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,247 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,247 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,247 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2204
2020-03-24 10:13:42,295 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2204
2020-03-24 10:13:42,311 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,311 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,311 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,311 [root] DEBUG: Loader: Injecting process 2204 (thread 2264) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,325 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,325 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,325 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,325 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,325 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2204
2020-03-24 10:13:42,342 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2444
2020-03-24 10:13:42,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,358 [root] DEBUG: Loader: Injecting process 2444 (thread 2728) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,358 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,358 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,372 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2444
2020-03-24 10:13:42,420 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2444
2020-03-24 10:13:42,420 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,420 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,420 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,420 [root] DEBUG: Loader: Injecting process 2444 (thread 2728) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,420 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,436 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,436 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,436 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,436 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2444
2020-03-24 10:13:42,467 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2260
2020-03-24 10:13:42,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,482 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,482 [root] DEBUG: Loader: Injecting process 2260 (thread 2172) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,482 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,482 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,482 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,497 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,497 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2260
2020-03-24 10:13:42,529 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2260
2020-03-24 10:13:42,529 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,529 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,545 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,545 [root] DEBUG: Loader: Injecting process 2260 (thread 2172) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,545 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,545 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,545 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,559 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,559 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2260
2020-03-24 10:13:42,575 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2464
2020-03-24 10:13:42,575 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,575 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,592 [root] DEBUG: Loader: Injecting process 2464 (thread 2356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,592 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,607 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,607 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2464
2020-03-24 10:13:42,638 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2464
2020-03-24 10:13:42,638 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,638 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,654 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,654 [root] DEBUG: Loader: Injecting process 2464 (thread 2356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,654 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,654 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,654 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,654 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,670 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2464
2020-03-24 10:13:42,684 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2816
2020-03-24 10:13:42,684 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,684 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,700 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,700 [root] DEBUG: Loader: Injecting process 2816 (thread 2932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,700 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,700 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,700 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,700 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,700 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2816
2020-03-24 10:13:42,763 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2816
2020-03-24 10:13:42,763 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,763 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,779 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,779 [root] DEBUG: Loader: Injecting process 2816 (thread 2932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,779 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,779 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,793 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,793 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,793 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2816
2020-03-24 10:13:42,825 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2392
2020-03-24 10:13:42,825 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,825 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,841 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,841 [root] DEBUG: Loader: Injecting process 2392 (thread 2344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,841 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,841 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,857 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,857 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,857 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2392
2020-03-24 10:13:42,904 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2392
2020-03-24 10:13:42,904 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,904 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,918 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,918 [root] DEBUG: Loader: Injecting process 2392 (thread 2344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,918 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,918 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,918 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:42,918 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,918 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2392
2020-03-24 10:13:42,934 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2976
2020-03-24 10:13:42,934 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,934 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:42,950 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:42,950 [root] DEBUG: Loader: Injecting process 2976 (thread 2888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,950 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:42,950 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,950 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:42,950 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:42,950 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2976
2020-03-24 10:13:42,996 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2976
2020-03-24 10:13:42,996 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:42,996 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,013 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,013 [root] DEBUG: Loader: Injecting process 2976 (thread 2888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,013 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,013 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,013 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,013 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,013 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2976
2020-03-24 10:13:43,028 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2588
2020-03-24 10:13:43,028 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,028 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,028 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,043 [root] DEBUG: Loader: Injecting process 2588 (thread 2656) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,043 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,043 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,043 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,043 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,043 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-03-24 10:13:43,091 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2588
2020-03-24 10:13:43,091 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,091 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,091 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,091 [root] DEBUG: Loader: Injecting process 2588 (thread 2656) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,105 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,105 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,105 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,105 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,105 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-03-24 10:13:43,121 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2384
2020-03-24 10:13:43,121 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,121 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,138 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,138 [root] DEBUG: Loader: Injecting process 2384 (thread 2088) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,138 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,138 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,138 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,138 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,138 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2384
2020-03-24 10:13:43,184 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2384
2020-03-24 10:13:43,184 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,184 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,184 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,200 [root] DEBUG: Loader: Injecting process 2384 (thread 2088) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,200 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,200 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,200 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,200 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,200 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2384
2020-03-24 10:13:43,230 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2964
2020-03-24 10:13:43,230 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,230 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,246 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,246 [root] DEBUG: Loader: Injecting process 2964 (thread 2916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,246 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,246 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,246 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,246 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,246 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2964
2020-03-24 10:13:43,293 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2964
2020-03-24 10:13:43,293 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,293 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,309 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,309 [root] DEBUG: Loader: Injecting process 2964 (thread 2916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,309 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,325 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,325 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,325 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,325 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2964
2020-03-24 10:13:43,355 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2848
2020-03-24 10:13:43,371 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,371 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,387 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,403 [root] DEBUG: Loader: Injecting process 2848 (thread 2912) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,403 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,403 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,403 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,403 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,403 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2848
2020-03-24 10:13:43,434 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2848
2020-03-24 10:13:43,434 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,434 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,450 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,450 [root] DEBUG: Loader: Injecting process 2848 (thread 2912) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,450 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,450 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,464 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,464 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,464 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2848
2020-03-24 10:13:43,480 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3044
2020-03-24 10:13:43,480 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,480 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,496 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,496 [root] DEBUG: Loader: Injecting process 3044 (thread 2616) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,496 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,496 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,496 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,496 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,496 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3044
2020-03-24 10:13:43,542 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3044
2020-03-24 10:13:43,542 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,542 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,559 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,559 [root] DEBUG: Loader: Injecting process 3044 (thread 2616) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,559 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,573 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,573 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,573 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,573 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3044
2020-03-24 10:13:43,589 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2720
2020-03-24 10:13:43,589 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,589 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,605 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,605 [root] DEBUG: Loader: Injecting process 2720 (thread 2460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,605 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,605 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,605 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,605 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,605 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2720
2020-03-24 10:13:43,651 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2720
2020-03-24 10:13:43,651 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,651 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,667 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,684 [root] DEBUG: Loader: Injecting process 2720 (thread 2460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,684 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,684 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,684 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,684 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,684 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2720
2020-03-24 10:13:43,698 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 788
2020-03-24 10:13:43,698 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,698 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,714 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,730 [root] DEBUG: Loader: Injecting process 788 (thread 2864) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,730 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,730 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,730 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,730 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,746 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 788
2020-03-24 10:13:43,776 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 788
2020-03-24 10:13:43,776 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,776 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,823 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,823 [root] DEBUG: Loader: Injecting process 788 (thread 2864) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,823 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,823 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,839 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,839 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,839 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 788
2020-03-24 10:13:43,855 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2560
2020-03-24 10:13:43,855 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,855 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,871 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,871 [root] DEBUG: Loader: Injecting process 2560 (thread 2432) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,871 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,871 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,885 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,885 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,885 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2560
2020-03-24 10:13:43,917 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2560
2020-03-24 10:13:43,917 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,917 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,933 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,933 [root] DEBUG: Loader: Injecting process 2560 (thread 2432) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,933 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,933 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,933 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:43,933 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,933 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2560
2020-03-24 10:13:43,963 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2076
2020-03-24 10:13:43,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:43,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:43,980 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:43,980 [root] DEBUG: Loader: Injecting process 2076 (thread 2940) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,980 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:43,980 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,980 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:43,980 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:43,980 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2076
2020-03-24 10:13:44,026 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 2076
2020-03-24 10:13:44,026 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,026 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,042 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,042 [root] DEBUG: Loader: Injecting process 2076 (thread 2940) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,042 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,042 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,042 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2076
2020-03-24 10:13:44,073 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3152
2020-03-24 10:13:44,088 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,088 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,088 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,088 [root] DEBUG: Loader: Injecting process 3152 (thread 3156) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,088 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,105 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,105 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,105 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,105 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3152
2020-03-24 10:13:44,151 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3152
2020-03-24 10:13:44,151 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,151 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,151 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,167 [root] DEBUG: Loader: Injecting process 3152 (thread 3156) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,167 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,167 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,167 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,167 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,167 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3152
2020-03-24 10:13:44,197 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3248
2020-03-24 10:13:44,197 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,197 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,213 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,213 [root] DEBUG: Loader: Injecting process 3248 (thread 3252) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,213 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,213 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,213 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,213 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,230 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3248
2020-03-24 10:13:44,276 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3248
2020-03-24 10:13:44,276 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,276 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,276 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,276 [root] DEBUG: Loader: Injecting process 3248 (thread 3252) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,276 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,292 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,292 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,292 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,292 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3248
2020-03-24 10:13:44,308 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3344
2020-03-24 10:13:44,308 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,308 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,322 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,322 [root] DEBUG: Loader: Injecting process 3344 (thread 3348) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,322 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,322 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,322 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,322 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,322 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3344
2020-03-24 10:13:44,369 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3344
2020-03-24 10:13:44,369 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,369 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,385 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,385 [root] DEBUG: Loader: Injecting process 3344 (thread 3348) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,385 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,385 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,401 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,401 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,401 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3344
2020-03-24 10:13:44,417 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3440
2020-03-24 10:13:44,417 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,417 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,431 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,431 [root] DEBUG: Loader: Injecting process 3440 (thread 3444) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,431 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,447 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,447 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,447 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,447 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3440
2020-03-24 10:13:44,479 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3440
2020-03-24 10:13:44,479 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,479 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,494 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,509 [root] DEBUG: Loader: Injecting process 3440 (thread 3444) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,509 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,509 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,509 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,509 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,509 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3440
2020-03-24 10:13:44,526 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3536
2020-03-24 10:13:44,526 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,526 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,542 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,542 [root] DEBUG: Loader: Injecting process 3536 (thread 3540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,542 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,542 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,542 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,542 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,542 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3536
2020-03-24 10:13:44,604 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3536
2020-03-24 10:13:44,604 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,604 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,619 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,619 [root] DEBUG: Loader: Injecting process 3536 (thread 3540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,619 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,619 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,619 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,619 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,619 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3536
2020-03-24 10:13:44,651 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3632
2020-03-24 10:13:44,651 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,651 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,665 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,665 [root] DEBUG: Loader: Injecting process 3632 (thread 3636) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,665 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,665 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,665 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,665 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,665 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3632
2020-03-24 10:13:44,713 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3632
2020-03-24 10:13:44,713 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,713 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,729 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,729 [root] DEBUG: Loader: Injecting process 3632 (thread 3636) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,729 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,729 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,729 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,743 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,743 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3632
2020-03-24 10:13:44,759 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3728
2020-03-24 10:13:44,759 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,759 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,776 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,776 [root] DEBUG: Loader: Injecting process 3728 (thread 3732) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,776 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,776 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,776 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,776 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,776 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3728
2020-03-24 10:13:44,806 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3728
2020-03-24 10:13:44,822 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,822 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,822 [root] DEBUG: Loader: Injecting process 3728 (thread 3732) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,838 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,838 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,838 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,838 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,838 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3728
2020-03-24 10:13:44,884 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3824
2020-03-24 10:13:44,900 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,900 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,915 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,915 [root] DEBUG: Loader: Injecting process 3824 (thread 3828) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,915 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,915 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,915 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:44,915 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,915 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3824
2020-03-24 10:13:44,963 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3824
2020-03-24 10:13:44,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:44,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:44,977 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:44,977 [root] DEBUG: Loader: Injecting process 3824 (thread 3828) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,993 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:44,993 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,993 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:44,993 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:44,993 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3824
2020-03-24 10:13:45,009 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3920
2020-03-24 10:13:45,009 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,009 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,025 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,025 [root] DEBUG: Loader: Injecting process 3920 (thread 3924) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,025 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,025 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,025 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,025 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,025 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3920
2020-03-24 10:13:45,072 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3920
2020-03-24 10:13:45,072 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,072 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,088 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,088 [root] DEBUG: Loader: Injecting process 3920 (thread 3924) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,088 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,088 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,102 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,102 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,102 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3920
2020-03-24 10:13:45,134 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4016
2020-03-24 10:13:45,134 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,134 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,150 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,150 [root] DEBUG: Loader: Injecting process 4016 (thread 4020) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,150 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,150 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,165 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,180 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,180 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4016
2020-03-24 10:13:45,227 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4016
2020-03-24 10:13:45,227 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,227 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,259 [root] DEBUG: Loader: Injecting process 4016 (thread 4020) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,275 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,275 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,275 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,275 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4016
2020-03-24 10:13:45,289 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3100
2020-03-24 10:13:45,305 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,305 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,322 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,322 [root] DEBUG: Loader: Injecting process 3100 (thread 3104) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,352 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,352 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,352 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,352 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,352 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3100
2020-03-24 10:13:45,400 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3100
2020-03-24 10:13:45,414 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,414 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,414 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,430 [root] DEBUG: Loader: Injecting process 3100 (thread 3104) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,430 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,430 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,430 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,430 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,430 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3100
2020-03-24 10:13:45,461 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3168
2020-03-24 10:13:45,461 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,461 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,477 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,477 [root] DEBUG: Loader: Injecting process 3168 (thread 3220) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,493 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,493 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,509 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3168
2020-03-24 10:13:45,555 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3168
2020-03-24 10:13:45,555 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,555 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,571 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,571 [root] DEBUG: Loader: Injecting process 3168 (thread 3220) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,571 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,586 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,586 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,586 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,586 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3168
2020-03-24 10:13:45,618 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3328
2020-03-24 10:13:45,634 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,634 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,648 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,648 [root] DEBUG: Loader: Injecting process 3328 (thread 3332) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,648 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,648 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,648 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,648 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,664 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3328
2020-03-24 10:13:45,696 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3328
2020-03-24 10:13:45,696 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,696 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,711 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,711 [root] DEBUG: Loader: Injecting process 3328 (thread 3332) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,726 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,726 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,726 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,726 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,743 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3328
2020-03-24 10:13:45,757 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3404
2020-03-24 10:13:45,773 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,773 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,789 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,789 [root] DEBUG: Loader: Injecting process 3404 (thread 3400) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,805 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,805 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,805 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:45,805 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,805 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3404
2020-03-24 10:13:45,868 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3404
2020-03-24 10:13:45,868 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,868 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,882 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,882 [root] DEBUG: Loader: Injecting process 3404 (thread 3400) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,898 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,898 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,898 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:45,898 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,898 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3404
2020-03-24 10:13:45,960 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3564
2020-03-24 10:13:45,960 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:45,976 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:45,992 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:45,992 [root] DEBUG: Loader: Injecting process 3564 (thread 3568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:45,992 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:45,992 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,007 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,007 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,007 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3564
2020-03-24 10:13:46,055 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3564
2020-03-24 10:13:46,055 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,055 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,055 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,055 [root] DEBUG: Loader: Injecting process 3564 (thread 3568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,055 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,069 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,069 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,069 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,069 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3564
2020-03-24 10:13:46,085 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3676
2020-03-24 10:13:46,085 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,085 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,101 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,101 [root] DEBUG: Loader: Injecting process 3676 (thread 3652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,101 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,101 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,101 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,101 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,101 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3676
2020-03-24 10:13:46,164 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3676
2020-03-24 10:13:46,164 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,164 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,164 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,180 [root] DEBUG: Loader: Injecting process 3676 (thread 3652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,180 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,180 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,180 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,180 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,180 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3676
2020-03-24 10:13:46,194 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3744
2020-03-24 10:13:46,194 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,194 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,210 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,210 [root] DEBUG: Loader: Injecting process 3744 (thread 3796) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,210 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,210 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,210 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,226 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3744
2020-03-24 10:13:46,257 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3744
2020-03-24 10:13:46,257 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,257 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,273 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,273 [root] DEBUG: Loader: Injecting process 3744 (thread 3796) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,273 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,273 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,289 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,289 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,289 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3744
2020-03-24 10:13:46,303 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3904
2020-03-24 10:13:46,303 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,303 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,319 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,319 [root] DEBUG: Loader: Injecting process 3904 (thread 3908) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,319 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,319 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,335 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,335 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,335 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3904
2020-03-24 10:13:46,367 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3904
2020-03-24 10:13:46,367 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,367 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,398 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,398 [root] DEBUG: Loader: Injecting process 3904 (thread 3908) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,414 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,414 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,414 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,414 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,414 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3904
2020-03-24 10:13:46,428 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3980
2020-03-24 10:13:46,428 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,428 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,444 [root] DEBUG: Loader: Injecting process 3980 (thread 3976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,444 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,444 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,444 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,444 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,460 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3980
2020-03-24 10:13:46,492 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3980
2020-03-24 10:13:46,506 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,506 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,506 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,523 [root] DEBUG: Loader: Injecting process 3980 (thread 3976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,523 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,523 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,523 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,523 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,523 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3980
2020-03-24 10:13:46,538 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3132
2020-03-24 10:13:46,538 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,538 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,553 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,553 [root] DEBUG: Loader: Injecting process 3132 (thread 3136) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,553 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,553 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,569 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,569 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,569 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3132
2020-03-24 10:13:46,615 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3132
2020-03-24 10:13:46,615 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,615 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,615 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,631 [root] DEBUG: Loader: Injecting process 3132 (thread 3136) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,631 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,631 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,631 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,631 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,631 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3132
2020-03-24 10:13:46,648 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3244
2020-03-24 10:13:46,648 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,648 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,663 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,663 [root] DEBUG: Loader: Injecting process 3244 (thread 3276) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,663 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,678 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,678 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,678 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,678 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3244
2020-03-24 10:13:46,740 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3244
2020-03-24 10:13:46,740 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,740 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,756 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,756 [root] DEBUG: Loader: Injecting process 3244 (thread 3276) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,756 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,756 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,756 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,756 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,756 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3244
2020-03-24 10:13:46,772 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3308
2020-03-24 10:13:46,772 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,772 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,788 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,788 [root] DEBUG: Loader: Injecting process 3308 (thread 3412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,803 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,803 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,819 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,819 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,835 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3308
2020-03-24 10:13:46,881 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3308
2020-03-24 10:13:46,881 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,881 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,897 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,897 [root] DEBUG: Loader: Injecting process 3308 (thread 3412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,897 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,897 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,897 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:46,913 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,913 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3308
2020-03-24 10:13:46,927 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3500
2020-03-24 10:13:46,927 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:46,927 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:46,944 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:46,944 [root] DEBUG: Loader: Injecting process 3500 (thread 3496) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,944 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:46,944 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,944 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:46,960 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:46,960 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3500
2020-03-24 10:13:47,038 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3500
2020-03-24 10:13:47,038 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,038 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,052 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,052 [root] DEBUG: Loader: Injecting process 3500 (thread 3496) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,052 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,052 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,052 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,052 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,052 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3500
2020-03-24 10:13:47,069 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3600
2020-03-24 10:13:47,069 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,069 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,084 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,084 [root] DEBUG: Loader: Injecting process 3600 (thread 3624) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,084 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,084 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,084 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,084 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,099 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3600
2020-03-24 10:13:47,147 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3600
2020-03-24 10:13:47,147 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,147 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,161 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,161 [root] DEBUG: Loader: Injecting process 3600 (thread 3624) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,177 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,177 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,177 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,194 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,194 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3600
2020-03-24 10:13:47,209 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3792
2020-03-24 10:13:47,209 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,209 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,224 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,224 [root] DEBUG: Loader: Injecting process 3792 (thread 3788) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,224 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,224 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,224 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,224 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,240 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3792
2020-03-24 10:13:47,272 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3792
2020-03-24 10:13:47,272 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,272 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,286 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,286 [root] DEBUG: Loader: Injecting process 3792 (thread 3788) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,302 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,302 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,302 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,302 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,302 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3792
2020-03-24 10:13:47,318 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3960
2020-03-24 10:13:47,318 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,318 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,334 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,334 [root] DEBUG: Loader: Injecting process 3960 (thread 3964) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,334 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,334 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,334 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,334 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,349 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3960
2020-03-24 10:13:47,381 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3960
2020-03-24 10:13:47,395 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,395 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,395 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,395 [root] DEBUG: Loader: Injecting process 3960 (thread 3964) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,395 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,411 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,411 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,411 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,411 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3960
2020-03-24 10:13:47,427 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4044
2020-03-24 10:13:47,427 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,427 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,443 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,443 [root] DEBUG: Loader: Injecting process 4044 (thread 3088) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,443 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,443 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,443 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,443 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,443 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4044
2020-03-24 10:13:47,490 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4044
2020-03-24 10:13:47,490 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,490 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,506 [root] DEBUG: Loader: Injecting process 4044 (thread 3088) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,506 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,506 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,506 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,506 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,506 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4044
2020-03-24 10:13:47,520 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3216
2020-03-24 10:13:47,520 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,520 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,536 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,536 [root] DEBUG: Loader: Injecting process 3216 (thread 3212) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,536 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,536 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,536 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,536 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,536 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3216
2020-03-24 10:13:47,584 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3216
2020-03-24 10:13:47,584 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,584 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,598 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,598 [root] DEBUG: Loader: Injecting process 3216 (thread 3212) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,598 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,598 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,598 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,598 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,615 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3216
2020-03-24 10:13:47,630 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3324
2020-03-24 10:13:47,630 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,630 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,645 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,645 [root] DEBUG: Loader: Injecting process 3324 (thread 3280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,645 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,645 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,645 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,645 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,645 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3324
2020-03-24 10:13:47,677 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3324
2020-03-24 10:13:47,677 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,677 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,693 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,693 [root] DEBUG: Loader: Injecting process 3324 (thread 3280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,693 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,693 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,707 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,707 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,707 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3324
2020-03-24 10:13:47,723 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3532
2020-03-24 10:13:47,723 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,723 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,740 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,740 [root] DEBUG: Loader: Injecting process 3532 (thread 3556) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,740 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,755 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,755 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,755 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,755 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3532
2020-03-24 10:13:47,786 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3532
2020-03-24 10:13:47,786 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,802 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,802 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,802 [root] DEBUG: Loader: Injecting process 3532 (thread 3556) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,802 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,802 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,802 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,818 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,818 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3532
2020-03-24 10:13:47,832 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3700
2020-03-24 10:13:47,832 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,832 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,848 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,848 [root] DEBUG: Loader: Injecting process 3700 (thread 3712) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,848 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,848 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,848 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,848 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,848 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3700
2020-03-24 10:13:47,895 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3700
2020-03-24 10:13:47,895 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,895 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,895 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,895 [root] DEBUG: Loader: Injecting process 3700 (thread 3712) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,911 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,911 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,911 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:47,911 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,911 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3700
2020-03-24 10:13:47,927 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3820
2020-03-24 10:13:47,927 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:47,927 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:47,941 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:47,941 [root] DEBUG: Loader: Injecting process 3820 (thread 3860) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,941 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:47,941 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,941 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:47,941 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:47,941 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3820
2020-03-24 10:13:48,005 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3820
2020-03-24 10:13:48,005 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,005 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,005 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,005 [root] DEBUG: Loader: Injecting process 3820 (thread 3860) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,005 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,019 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,019 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,019 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,019 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3820
2020-03-24 10:13:48,036 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4040
2020-03-24 10:13:48,036 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,036 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,082 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,082 [root] DEBUG: Loader: Injecting process 4040 (thread 4032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,082 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,098 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,098 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,098 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,098 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4040
2020-03-24 10:13:48,144 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4040
2020-03-24 10:13:48,144 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,144 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,144 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,161 [root] DEBUG: Loader: Injecting process 4040 (thread 4032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,161 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,161 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,161 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,161 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,161 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4040
2020-03-24 10:13:48,176 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3188
2020-03-24 10:13:48,176 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,176 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,191 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,191 [root] DEBUG: Loader: Injecting process 3188 (thread 3180) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,191 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,191 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,191 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,191 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,207 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3188
2020-03-24 10:13:48,239 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3188
2020-03-24 10:13:48,239 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,253 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,269 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,269 [root] DEBUG: Loader: Injecting process 3188 (thread 3180) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,269 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,269 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,269 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,269 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,269 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3188
2020-03-24 10:13:48,286 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3392
2020-03-24 10:13:48,286 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,286 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,301 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,301 [root] DEBUG: Loader: Injecting process 3392 (thread 3408) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,301 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,301 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,301 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,301 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,316 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3392
2020-03-24 10:13:48,348 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3392
2020-03-24 10:13:48,348 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,348 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,348 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,364 [root] DEBUG: Loader: Injecting process 3392 (thread 3408) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,364 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,364 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,364 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,364 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,364 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3392
2020-03-24 10:13:48,378 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3628
2020-03-24 10:13:48,378 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,378 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,394 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,394 [root] DEBUG: Loader: Injecting process 3628 (thread 3660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,394 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,394 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,394 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,394 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,394 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3628
2020-03-24 10:13:48,441 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3628
2020-03-24 10:13:48,441 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,441 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,457 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,457 [root] DEBUG: Loader: Injecting process 3628 (thread 3660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,457 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,457 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,457 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,457 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,473 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3628
2020-03-24 10:13:48,487 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3708
2020-03-24 10:13:48,487 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,487 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,503 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,503 [root] DEBUG: Loader: Injecting process 3708 (thread 3808) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,503 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,503 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,503 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,503 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,519 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3708
2020-03-24 10:13:48,551 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3708
2020-03-24 10:13:48,551 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,551 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,565 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,565 [root] DEBUG: Loader: Injecting process 3708 (thread 3808) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,565 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,565 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,565 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,582 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,582 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3708
2020-03-24 10:13:48,598 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3888
2020-03-24 10:13:48,598 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,598 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,612 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,612 [root] DEBUG: Loader: Injecting process 3888 (thread 4064) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,612 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,612 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,612 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,612 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,628 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3888
2020-03-24 10:13:48,660 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3888
2020-03-24 10:13:48,676 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,676 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,676 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,690 [root] DEBUG: Loader: Injecting process 3888 (thread 4064) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,690 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,690 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,690 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,690 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,690 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3888
2020-03-24 10:13:48,707 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4072
2020-03-24 10:13:48,707 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,707 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,721 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,721 [root] DEBUG: Loader: Injecting process 4072 (thread 4068) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,721 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,721 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,737 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,737 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,737 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4072
2020-03-24 10:13:48,769 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4072
2020-03-24 10:13:48,769 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,769 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,785 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,799 [root] DEBUG: Loader: Injecting process 4072 (thread 4068) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,799 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,799 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,799 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,799 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,815 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4072
2020-03-24 10:13:48,832 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3364
2020-03-24 10:13:48,832 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,832 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,846 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,846 [root] DEBUG: Loader: Injecting process 3364 (thread 3360) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,846 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,862 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,862 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,862 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,862 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3364
2020-03-24 10:13:48,910 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3364
2020-03-24 10:13:48,910 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,910 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,924 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,924 [root] DEBUG: Loader: Injecting process 3364 (thread 3360) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,924 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,924 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,924 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:48,940 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,940 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3364
2020-03-24 10:13:48,956 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3584
2020-03-24 10:13:48,956 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:48,956 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:48,971 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:48,971 [root] DEBUG: Loader: Injecting process 3584 (thread 3580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,971 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:48,971 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,971 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:48,971 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:48,971 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3584
2020-03-24 10:13:49,019 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3584
2020-03-24 10:13:49,019 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,019 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,019 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,033 [root] DEBUG: Loader: Injecting process 3584 (thread 3580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,033 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,033 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,033 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,033 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,033 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3584
2020-03-24 10:13:49,049 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3844
2020-03-24 10:13:49,049 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,049 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,065 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,065 [root] DEBUG: Loader: Injecting process 3844 (thread 3996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,065 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,065 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,065 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,081 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,081 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3844
2020-03-24 10:13:49,144 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3844
2020-03-24 10:13:49,144 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,144 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,158 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,158 [root] DEBUG: Loader: Injecting process 3844 (thread 3996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,158 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,158 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,174 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,174 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,174 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3844
2020-03-24 10:13:49,190 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3120
2020-03-24 10:13:49,190 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,190 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,206 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,206 [root] DEBUG: Loader: Injecting process 3120 (thread 3108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,206 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,206 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,206 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,206 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,221 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3120
2020-03-24 10:13:49,253 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3120
2020-03-24 10:13:49,253 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,253 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,253 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,267 [root] DEBUG: Loader: Injecting process 3120 (thread 3108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,267 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,267 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,267 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,267 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,267 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3120
2020-03-24 10:13:49,299 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3232
2020-03-24 10:13:49,299 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,299 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,315 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,315 [root] DEBUG: Loader: Injecting process 3232 (thread 3268) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,315 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,315 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,315 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,315 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,315 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3232
2020-03-24 10:13:49,361 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3232
2020-03-24 10:13:49,361 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,361 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,378 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,392 [root] DEBUG: Loader: Injecting process 3232 (thread 3268) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,392 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,392 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,392 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,392 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,392 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3232
2020-03-24 10:13:49,424 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3688
2020-03-24 10:13:49,424 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,424 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,440 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,440 [root] DEBUG: Loader: Injecting process 3688 (thread 3772) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,440 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,440 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,440 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,456 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,456 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3688
2020-03-24 10:13:49,502 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3688
2020-03-24 10:13:49,502 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,502 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,517 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,517 [root] DEBUG: Loader: Injecting process 3688 (thread 3772) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,517 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,517 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,517 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,517 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,533 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3688
2020-03-24 10:13:49,549 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3988
2020-03-24 10:13:49,549 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,565 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,579 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,579 [root] DEBUG: Loader: Injecting process 3988 (thread 4036) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,579 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,579 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,595 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,595 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,595 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-03-24 10:13:49,642 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3988
2020-03-24 10:13:49,642 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,642 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,657 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,657 [root] DEBUG: Loader: Injecting process 3988 (thread 4036) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,657 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,657 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,674 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,674 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,674 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-03-24 10:13:49,690 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3968
2020-03-24 10:13:49,690 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,690 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,704 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,704 [root] DEBUG: Loader: Injecting process 3968 (thread 3296) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,704 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,704 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,720 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,720 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3968
2020-03-24 10:13:49,767 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3968
2020-03-24 10:13:49,767 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,767 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,782 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,782 [root] DEBUG: Loader: Injecting process 3968 (thread 3296) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,782 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,782 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,799 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,799 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,799 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3968
2020-03-24 10:13:49,813 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3476
2020-03-24 10:13:49,813 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,813 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,829 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,829 [root] DEBUG: Loader: Injecting process 3476 (thread 3592) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,829 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,829 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,829 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:49,829 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3476
2020-03-24 10:13:49,924 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3476
2020-03-24 10:13:49,924 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,924 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,938 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:49,938 [root] DEBUG: Loader: Injecting process 3476 (thread 3592) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,938 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:49,938 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,938 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:49,938 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:49,954 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3476
2020-03-24 10:13:49,970 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3812
2020-03-24 10:13:49,970 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:49,970 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:49,986 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,002 [root] DEBUG: Loader: Injecting process 3812 (thread 3840) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,002 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,002 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,002 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,002 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,002 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3812
2020-03-24 10:13:50,048 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3812
2020-03-24 10:13:50,048 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,048 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,063 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,063 [root] DEBUG: Loader: Injecting process 3812 (thread 3840) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,063 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,063 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,079 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,079 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,079 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3812
2020-03-24 10:13:50,095 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3288
2020-03-24 10:13:50,095 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,095 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,111 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,111 [root] DEBUG: Loader: Injecting process 3288 (thread 3264) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,111 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,111 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,111 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,111 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3288
2020-03-24 10:13:50,157 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3288
2020-03-24 10:13:50,157 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,220 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,220 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,220 [root] DEBUG: Loader: Injecting process 3288 (thread 3264) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,236 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,236 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,236 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,236 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,236 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3288
2020-03-24 10:13:50,250 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3764
2020-03-24 10:13:50,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,266 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,266 [root] DEBUG: Loader: Injecting process 3764 (thread 3760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,266 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,266 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,266 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,266 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,282 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3764
2020-03-24 10:13:50,313 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3764
2020-03-24 10:13:50,313 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,313 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,345 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,345 [root] DEBUG: Loader: Injecting process 3764 (thread 3760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,345 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,345 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,345 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,345 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,345 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3764
2020-03-24 10:13:50,375 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4000
2020-03-24 10:13:50,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,391 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,391 [root] DEBUG: Loader: Injecting process 4000 (thread 3272) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,391 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,391 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,391 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,407 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,407 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4000
2020-03-24 10:13:50,437 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4000
2020-03-24 10:13:50,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,453 [root] DEBUG: Loader: Injecting process 4000 (thread 3272) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,453 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,453 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4000
2020-03-24 10:13:50,484 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3692
2020-03-24 10:13:50,484 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,500 [root] DEBUG: Loader: Injecting process 3692 (thread 3724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,516 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,516 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,516 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,516 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,516 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3692
2020-03-24 10:13:50,562 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3692
2020-03-24 10:13:50,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,562 [root] DEBUG: Loader: Injecting process 3692 (thread 3724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,562 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,578 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3692
2020-03-24 10:13:50,594 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3128
2020-03-24 10:13:50,594 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,594 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,609 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,609 [root] DEBUG: Loader: Injecting process 3128 (thread 3852) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,609 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,609 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,609 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,609 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3128
2020-03-24 10:13:50,657 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3128
2020-03-24 10:13:50,657 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,657 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,687 [root] DEBUG: Loader: Injecting process 3128 (thread 3852) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,687 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,687 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3128
2020-03-24 10:13:50,719 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3748
2020-03-24 10:13:50,719 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,719 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,734 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,734 [root] DEBUG: Loader: Injecting process 3748 (thread 3956) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,750 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,750 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-03-24 10:13:50,796 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3748
2020-03-24 10:13:50,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,812 [root] DEBUG: Loader: Injecting process 3748 (thread 3956) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,812 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:50,844 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,844 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-03-24 10:13:50,859 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3116
2020-03-24 10:13:50,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,891 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,891 [root] DEBUG: Loader: Injecting process 3116 (thread 3084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,905 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:50,921 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3116
2020-03-24 10:13:50,969 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3116
2020-03-24 10:13:50,969 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:50,969 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:50,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:50,983 [root] DEBUG: Loader: Injecting process 3116 (thread 3084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,983 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:50,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:50,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,000 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3116
2020-03-24 10:13:51,016 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3896
2020-03-24 10:13:51,016 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,016 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,046 [root] DEBUG: Loader: Injecting process 3896 (thread 3756) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,046 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,046 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3896
2020-03-24 10:13:51,094 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3896
2020-03-24 10:13:51,094 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,094 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,108 [root] DEBUG: Loader: Injecting process 3896 (thread 3756) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,108 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,108 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3896
2020-03-24 10:13:51,125 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4004
2020-03-24 10:13:51,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,140 [root] DEBUG: Loader: Injecting process 4004 (thread 4084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,140 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,140 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-03-24 10:13:51,187 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4004
2020-03-24 10:13:51,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,203 [root] DEBUG: Loader: Injecting process 4004 (thread 4084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,203 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,217 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-03-24 10:13:51,280 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3388
2020-03-24 10:13:51,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,296 [root] DEBUG: Loader: Injecting process 3388 (thread 3460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,296 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,312 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3388
2020-03-24 10:13:51,342 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3388
2020-03-24 10:13:51,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,374 [root] DEBUG: Loader: Injecting process 3388 (thread 3460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,374 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,374 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,374 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,374 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3388
2020-03-24 10:13:51,405 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3196
2020-03-24 10:13:51,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,421 [root] DEBUG: Loader: Injecting process 3196 (thread 3916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,421 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,437 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3196
2020-03-24 10:13:51,483 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3196
2020-03-24 10:13:51,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,499 [root] DEBUG: Loader: Injecting process 3196 (thread 3916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,499 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,499 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,499 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,499 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,499 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3196
2020-03-24 10:13:51,529 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3200
2020-03-24 10:13:51,529 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,529 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,546 [root] DEBUG: Loader: Injecting process 3200 (thread 3944) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,546 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,562 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3200
2020-03-24 10:13:51,592 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3200
2020-03-24 10:13:51,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,608 [root] DEBUG: Loader: Injecting process 3200 (thread 3944) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,624 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,624 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,624 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,624 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,624 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3200
2020-03-24 10:13:51,654 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3424
2020-03-24 10:13:51,654 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,654 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,671 [root] DEBUG: Loader: Injecting process 3424 (thread 3596) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,671 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,671 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,686 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3424
2020-03-24 10:13:51,717 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3424
2020-03-24 10:13:51,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,749 [root] DEBUG: Loader: Injecting process 3424 (thread 3596) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,749 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,749 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,749 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,749 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,749 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3424
2020-03-24 10:13:51,763 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3456
2020-03-24 10:13:51,779 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,779 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,796 [root] DEBUG: Loader: Injecting process 3456 (thread 3316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,796 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,811 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,811 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,811 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,811 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3456
2020-03-24 10:13:51,842 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 3456
2020-03-24 10:13:51,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,858 [root] DEBUG: Loader: Injecting process 3456 (thread 3316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,874 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,874 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,874 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:51,874 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,874 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3456
2020-03-24 10:13:51,904 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4176
2020-03-24 10:13:51,904 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,904 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,920 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,936 [root] DEBUG: Loader: Injecting process 4176 (thread 4180) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,936 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:51,936 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,936 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:51,936 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:51,951 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4176
2020-03-24 10:13:51,983 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4176
2020-03-24 10:13:51,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:51,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:51,997 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:51,997 [root] DEBUG: Loader: Injecting process 4176 (thread 4180) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,013 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,013 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,013 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,013 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,013 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4176
2020-03-24 10:13:52,045 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4276
2020-03-24 10:13:52,045 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,045 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,061 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,061 [root] DEBUG: Loader: Injecting process 4276 (thread 4280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,061 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,061 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,061 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,075 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,075 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4276
2020-03-24 10:13:52,108 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4276
2020-03-24 10:13:52,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,138 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,138 [root] DEBUG: Loader: Injecting process 4276 (thread 4280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,138 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,138 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,138 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,138 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,154 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4276
2020-03-24 10:13:52,170 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4372
2020-03-24 10:13:52,170 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,170 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,186 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,186 [root] DEBUG: Loader: Injecting process 4372 (thread 4376) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,186 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,186 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,186 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,186 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,200 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4372
2020-03-24 10:13:52,232 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4372
2020-03-24 10:13:52,232 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,232 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,247 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,247 [root] DEBUG: Loader: Injecting process 4372 (thread 4376) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,247 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,247 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,247 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,247 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,247 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4372
2020-03-24 10:13:52,279 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4468
2020-03-24 10:13:52,325 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,342 [root] DEBUG: Loader: Injecting process 4468 (thread 4472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,342 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,357 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,357 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,357 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,357 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4468
2020-03-24 10:13:52,404 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4468
2020-03-24 10:13:52,404 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,404 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,420 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,420 [root] DEBUG: Loader: Injecting process 4468 (thread 4472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,420 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,420 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,420 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,420 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,434 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4468
2020-03-24 10:13:52,450 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4564
2020-03-24 10:13:52,450 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,450 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,466 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,466 [root] DEBUG: Loader: Injecting process 4564 (thread 4568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,466 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,466 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,466 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,482 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,482 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4564
2020-03-24 10:13:52,513 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4564
2020-03-24 10:13:52,513 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,513 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,529 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,529 [root] DEBUG: Loader: Injecting process 4564 (thread 4568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,529 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,543 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,543 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,543 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,543 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4564
2020-03-24 10:13:52,559 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4660
2020-03-24 10:13:52,559 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,559 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,575 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,591 [root] DEBUG: Loader: Injecting process 4660 (thread 4664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,591 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,591 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,607 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,607 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,607 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4660
2020-03-24 10:13:52,654 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4660
2020-03-24 10:13:52,654 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,654 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,668 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,668 [root] DEBUG: Loader: Injecting process 4660 (thread 4664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,668 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,668 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,668 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,668 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,668 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4660
2020-03-24 10:13:52,700 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4756
2020-03-24 10:13:52,700 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,700 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,716 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,716 [root] DEBUG: Loader: Injecting process 4756 (thread 4760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,732 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,732 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,732 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,732 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,732 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4756
2020-03-24 10:13:52,778 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4756
2020-03-24 10:13:52,778 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,778 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,793 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,793 [root] DEBUG: Loader: Injecting process 4756 (thread 4760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,793 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,793 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,793 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,793 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,793 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4756
2020-03-24 10:13:52,825 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4852
2020-03-24 10:13:52,825 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,825 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,841 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,841 [root] DEBUG: Loader: Injecting process 4852 (thread 4856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,841 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,841 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,841 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,841 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,855 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4852
2020-03-24 10:13:52,888 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4852
2020-03-24 10:13:52,888 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,888 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,903 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,903 [root] DEBUG: Loader: Injecting process 4852 (thread 4856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,903 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,903 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,903 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:52,903 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,918 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4852
2020-03-24 10:13:52,934 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4948
2020-03-24 10:13:52,934 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:52,934 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:52,966 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:52,966 [root] DEBUG: Loader: Injecting process 4948 (thread 4952) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,966 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:52,966 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,966 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:52,980 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:52,980 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4948
2020-03-24 10:13:53,028 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4948
2020-03-24 10:13:53,028 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,028 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,028 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,028 [root] DEBUG: Loader: Injecting process 4948 (thread 4952) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,043 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,043 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,043 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,043 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,043 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4948
2020-03-24 10:13:53,075 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5060
2020-03-24 10:13:53,075 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,075 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,089 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,089 [root] DEBUG: Loader: Injecting process 5060 (thread 5064) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,105 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,105 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,105 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,105 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,105 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5060
2020-03-24 10:13:53,167 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5060
2020-03-24 10:13:53,167 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,167 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,184 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,184 [root] DEBUG: Loader: Injecting process 5060 (thread 5064) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,184 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,184 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,184 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,184 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,184 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5060
2020-03-24 10:13:53,200 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4148
2020-03-24 10:13:53,200 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,200 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,214 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,214 [root] DEBUG: Loader: Injecting process 4148 (thread 4152) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,214 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,214 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,214 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,230 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,230 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4148
2020-03-24 10:13:53,278 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4148
2020-03-24 10:13:53,278 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,278 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,292 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,292 [root] DEBUG: Loader: Injecting process 4148 (thread 4152) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,292 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,292 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,292 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,292 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,309 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4148
2020-03-24 10:13:53,323 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4260
2020-03-24 10:13:53,323 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,323 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,339 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,339 [root] DEBUG: Loader: Injecting process 4260 (thread 4264) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,339 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,339 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,339 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,339 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,355 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4260
2020-03-24 10:13:53,417 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4260
2020-03-24 10:13:53,417 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,417 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,417 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,434 [root] DEBUG: Loader: Injecting process 4260 (thread 4264) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,434 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,434 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,434 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,434 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,434 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4260
2020-03-24 10:13:53,464 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4332
2020-03-24 10:13:53,464 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,464 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,480 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,480 [root] DEBUG: Loader: Injecting process 4332 (thread 4328) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,480 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,480 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,480 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,480 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,496 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4332
2020-03-24 10:13:53,526 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4332
2020-03-24 10:13:53,526 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,526 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,542 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,542 [root] DEBUG: Loader: Injecting process 4332 (thread 4328) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,542 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,542 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,542 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,542 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,542 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4332
2020-03-24 10:13:53,573 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4500
2020-03-24 10:13:53,573 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,573 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,589 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,589 [root] DEBUG: Loader: Injecting process 4500 (thread 4504) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,589 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,589 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,589 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,589 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,605 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4500
2020-03-24 10:13:53,635 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4500
2020-03-24 10:13:53,635 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,635 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,651 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,651 [root] DEBUG: Loader: Injecting process 4500 (thread 4504) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,651 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,651 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,651 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,651 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,667 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4500
2020-03-24 10:13:53,683 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4612
2020-03-24 10:13:53,683 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,683 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,698 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,698 [root] DEBUG: Loader: Injecting process 4612 (thread 4588) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,713 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,713 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,713 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,713 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,713 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4612
2020-03-24 10:13:53,760 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4612
2020-03-24 10:13:53,760 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,760 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,760 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,760 [root] DEBUG: Loader: Injecting process 4612 (thread 4588) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,776 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,776 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,776 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,776 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,776 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4612
2020-03-24 10:13:53,808 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4728
2020-03-24 10:13:53,808 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,808 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,823 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,823 [root] DEBUG: Loader: Injecting process 4728 (thread 4732) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,823 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,838 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,838 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,838 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,838 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4728
2020-03-24 10:13:53,869 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4728
2020-03-24 10:13:53,869 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,869 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,901 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,901 [root] DEBUG: Loader: Injecting process 4728 (thread 4732) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,901 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,901 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,901 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:53,901 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4728
2020-03-24 10:13:53,933 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4840
2020-03-24 10:13:53,933 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:53,933 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:53,947 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:53,947 [root] DEBUG: Loader: Injecting process 4840 (thread 4844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,947 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:53,963 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,963 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:53,963 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:53,963 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4840
2020-03-24 10:13:54,010 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4840
2020-03-24 10:13:54,010 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,010 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,026 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,026 [root] DEBUG: Loader: Injecting process 4840 (thread 4844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,026 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,026 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,026 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,042 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4840
2020-03-24 10:13:54,058 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4908
2020-03-24 10:13:54,058 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,058 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,072 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,072 [root] DEBUG: Loader: Injecting process 4908 (thread 4904) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,072 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,072 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,072 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,072 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,072 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4908
2020-03-24 10:13:54,119 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4908
2020-03-24 10:13:54,119 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,119 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,135 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,135 [root] DEBUG: Loader: Injecting process 4908 (thread 4904) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,135 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,135 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,135 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,135 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,151 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4908
2020-03-24 10:13:54,167 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1072
2020-03-24 10:13:54,167 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,167 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,181 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,181 [root] DEBUG: Loader: Injecting process 1072 (thread 5040) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,181 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,181 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,197 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,197 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,197 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1072
2020-03-24 10:13:54,244 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1072
2020-03-24 10:13:54,244 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,244 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,259 [root] DEBUG: Loader: Injecting process 1072 (thread 5040) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,259 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,259 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,276 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1072
2020-03-24 10:13:54,292 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4108
2020-03-24 10:13:54,292 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,292 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,306 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,306 [root] DEBUG: Loader: Injecting process 4108 (thread 5116) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,306 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,306 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,322 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,322 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,338 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4108
2020-03-24 10:13:54,384 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4108
2020-03-24 10:13:54,384 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,384 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,401 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,401 [root] DEBUG: Loader: Injecting process 4108 (thread 5116) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,401 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,401 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,401 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,415 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,415 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4108
2020-03-24 10:13:54,479 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4304
2020-03-24 10:13:54,479 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,479 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,479 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,493 [root] DEBUG: Loader: Injecting process 4304 (thread 4308) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,493 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,493 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,493 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4304
2020-03-24 10:13:54,540 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4304
2020-03-24 10:13:54,540 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,540 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,556 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,556 [root] DEBUG: Loader: Injecting process 4304 (thread 4308) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,556 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,572 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,572 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,572 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,572 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4304
2020-03-24 10:13:54,604 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4388
2020-03-24 10:13:54,604 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,604 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,618 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,618 [root] DEBUG: Loader: Injecting process 4388 (thread 4440) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,618 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,618 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,618 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,634 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,634 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4388
2020-03-24 10:13:54,681 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4388
2020-03-24 10:13:54,681 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,681 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,697 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,697 [root] DEBUG: Loader: Injecting process 4388 (thread 4440) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,697 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,697 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,713 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,713 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,713 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4388
2020-03-24 10:13:54,727 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4516
2020-03-24 10:13:54,727 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,743 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,759 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,759 [root] DEBUG: Loader: Injecting process 4516 (thread 4520) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,759 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,759 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,759 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,759 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,775 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4516
2020-03-24 10:13:54,805 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4516
2020-03-24 10:13:54,805 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,822 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,852 [root] DEBUG: Loader: Injecting process 4516 (thread 4520) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,852 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,852 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,852 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,852 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,852 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4516
2020-03-24 10:13:54,884 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4708
2020-03-24 10:13:54,884 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,884 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,900 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,900 [root] DEBUG: Loader: Injecting process 4708 (thread 4684) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,900 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,915 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,915 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:54,915 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,915 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4708
2020-03-24 10:13:54,947 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4708
2020-03-24 10:13:54,947 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,961 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:54,961 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:54,961 [root] DEBUG: Loader: Injecting process 4708 (thread 4684) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,961 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:54,977 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,977 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:54,977 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:54,977 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4708
2020-03-24 10:13:54,993 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4804
2020-03-24 10:13:54,993 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:54,993 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,009 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,009 [root] DEBUG: Loader: Injecting process 4804 (thread 4796) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,025 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,025 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,025 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,025 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,025 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4804
2020-03-24 10:13:55,072 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4804
2020-03-24 10:13:55,086 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,086 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,086 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,086 [root] DEBUG: Loader: Injecting process 4804 (thread 4796) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,102 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,102 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,102 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,102 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,102 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4804
2020-03-24 10:13:55,134 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4992
2020-03-24 10:13:55,134 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,134 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,150 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,150 [root] DEBUG: Loader: Injecting process 4992 (thread 4996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,150 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,150 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,164 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,164 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,180 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4992
2020-03-24 10:13:55,227 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4992
2020-03-24 10:13:55,227 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,227 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,243 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,243 [root] DEBUG: Loader: Injecting process 4992 (thread 4996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,243 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,259 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,259 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4992
2020-03-24 10:13:55,273 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5100
2020-03-24 10:13:55,289 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,289 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,336 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,336 [root] DEBUG: Loader: Injecting process 5100 (thread 5104) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,336 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,336 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,336 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,336 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,351 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5100
2020-03-24 10:13:55,398 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5100
2020-03-24 10:13:55,398 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,398 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,414 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,414 [root] DEBUG: Loader: Injecting process 5100 (thread 5104) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,414 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,414 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,446 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,446 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,446 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5100
2020-03-24 10:13:55,461 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4144
2020-03-24 10:13:55,461 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,461 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,476 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,476 [root] DEBUG: Loader: Injecting process 4144 (thread 4248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,493 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,507 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,571 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4144
2020-03-24 10:13:55,618 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4144
2020-03-24 10:13:55,632 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,632 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,648 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,648 [root] DEBUG: Loader: Injecting process 4144 (thread 4248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,648 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,648 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,664 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,664 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,680 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4144
2020-03-24 10:13:55,696 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4416
2020-03-24 10:13:55,696 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,696 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,726 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,726 [root] DEBUG: Loader: Injecting process 4416 (thread 4420) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,726 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,726 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,726 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,726 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,757 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4416
2020-03-24 10:13:55,789 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4416
2020-03-24 10:13:55,789 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,805 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,805 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,805 [root] DEBUG: Loader: Injecting process 4416 (thread 4420) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,805 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,805 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,805 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,819 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,819 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4416
2020-03-24 10:13:55,851 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4496
2020-03-24 10:13:55,851 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,851 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,867 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,867 [root] DEBUG: Loader: Injecting process 4496 (thread 4444) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,867 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,867 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,867 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:55,867 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,882 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4496
2020-03-24 10:13:55,930 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4496
2020-03-24 10:13:55,930 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,930 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,944 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,944 [root] DEBUG: Loader: Injecting process 4496 (thread 4444) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,944 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,944 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,944 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:55,944 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,944 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4496
2020-03-24 10:13:55,960 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4676
2020-03-24 10:13:55,976 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:55,976 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:55,992 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:55,992 [root] DEBUG: Loader: Injecting process 4676 (thread 4724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,992 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:55,992 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:55,992 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,007 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,007 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4676
2020-03-24 10:13:56,039 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4676
2020-03-24 10:13:56,039 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,039 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,053 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,069 [root] DEBUG: Loader: Injecting process 4676 (thread 4724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,069 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,069 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,069 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,085 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,085 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4676
2020-03-24 10:13:56,101 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4808
2020-03-24 10:13:56,101 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,101 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,131 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,131 [root] DEBUG: Loader: Injecting process 4808 (thread 4812) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,131 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,131 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,148 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,148 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,148 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4808
2020-03-24 10:13:56,210 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4808
2020-03-24 10:13:56,210 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,210 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,226 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,226 [root] DEBUG: Loader: Injecting process 4808 (thread 4812) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,226 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,226 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,226 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,242 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,242 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4808
2020-03-24 10:13:56,256 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4964
2020-03-24 10:13:56,256 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,256 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,288 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,288 [root] DEBUG: Loader: Injecting process 4964 (thread 5020) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,288 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,288 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,288 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,288 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,303 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4964
2020-03-24 10:13:56,351 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4964
2020-03-24 10:13:56,351 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,351 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,365 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,365 [root] DEBUG: Loader: Injecting process 4964 (thread 5020) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,365 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,365 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,365 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,365 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,381 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4964
2020-03-24 10:13:56,398 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4164
2020-03-24 10:13:56,413 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,413 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,428 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,428 [root] DEBUG: Loader: Injecting process 4164 (thread 4132) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,428 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,428 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,428 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,428 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,444 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4164
2020-03-24 10:13:56,476 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4164
2020-03-24 10:13:56,476 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,490 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,490 [root] DEBUG: Loader: Injecting process 4164 (thread 4132) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,506 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,506 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,506 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,506 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,506 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4164
2020-03-24 10:13:56,538 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4348
2020-03-24 10:13:56,538 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,538 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,553 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,553 [root] DEBUG: Loader: Injecting process 4348 (thread 4232) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,553 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,553 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,553 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,569 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,569 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4348
2020-03-24 10:13:56,647 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4348
2020-03-24 10:13:56,647 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,647 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,663 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,663 [root] DEBUG: Loader: Injecting process 4348 (thread 4232) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,663 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,677 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,677 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,677 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,677 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4348
2020-03-24 10:13:56,710 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4608
2020-03-24 10:13:56,710 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,710 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,724 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,724 [root] DEBUG: Loader: Injecting process 4608 (thread 4556) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,724 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,724 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,740 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,740 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,740 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4608
2020-03-24 10:13:56,788 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4608
2020-03-24 10:13:56,788 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,788 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,819 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,819 [root] DEBUG: Loader: Injecting process 4608 (thread 4556) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,819 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,834 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,834 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,834 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,849 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4608
2020-03-24 10:13:56,865 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4824
2020-03-24 10:13:56,865 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,865 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,897 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,897 [root] DEBUG: Loader: Injecting process 4824 (thread 4616) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,897 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,897 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,897 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:56,897 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,911 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4824
2020-03-24 10:13:56,944 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4824
2020-03-24 10:13:56,944 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,944 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:56,959 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:56,959 [root] DEBUG: Loader: Injecting process 4824 (thread 4616) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,959 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:56,959 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,959 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:56,974 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:56,974 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4824
2020-03-24 10:13:56,990 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4980
2020-03-24 10:13:56,990 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:56,990 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,006 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,022 [root] DEBUG: Loader: Injecting process 4980 (thread 5032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,022 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,022 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,036 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,036 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,036 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4980
2020-03-24 10:13:57,084 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4980
2020-03-24 10:13:57,084 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,084 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,115 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,115 [root] DEBUG: Loader: Injecting process 4980 (thread 5032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,115 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,115 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,115 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,115 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,131 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4980
2020-03-24 10:13:57,161 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4208
2020-03-24 10:13:57,161 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,177 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,193 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,193 [root] DEBUG: Loader: Injecting process 4208 (thread 4168) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,193 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,193 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,193 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,193 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,209 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4208
2020-03-24 10:13:57,240 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4208
2020-03-24 10:13:57,240 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,240 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,256 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,270 [root] DEBUG: Loader: Injecting process 4208 (thread 4168) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,270 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,270 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,270 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,286 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,286 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4208
2020-03-24 10:13:57,302 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4220
2020-03-24 10:13:57,302 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,302 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,318 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,318 [root] DEBUG: Loader: Injecting process 4220 (thread 4216) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,318 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,318 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,334 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,334 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,334 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4220
2020-03-24 10:13:57,380 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4220
2020-03-24 10:13:57,380 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,380 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,395 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,395 [root] DEBUG: Loader: Injecting process 4220 (thread 4216) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,395 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,395 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,395 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,395 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,395 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4220
2020-03-24 10:13:57,427 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4624
2020-03-24 10:13:57,427 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,427 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,457 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,457 [root] DEBUG: Loader: Injecting process 4624 (thread 4700) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,473 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,473 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,473 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,473 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,473 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4624
2020-03-24 10:13:57,520 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4624
2020-03-24 10:13:57,520 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,520 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,536 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,536 [root] DEBUG: Loader: Injecting process 4624 (thread 4700) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,536 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,536 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,552 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,552 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,552 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4624
2020-03-24 10:13:57,582 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4800
2020-03-24 10:13:57,598 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,598 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,598 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,614 [root] DEBUG: Loader: Injecting process 4800 (thread 4832) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,614 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,614 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,614 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,614 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,630 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4800
2020-03-24 10:13:57,645 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4800
2020-03-24 10:13:57,645 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,645 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,645 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,661 [root] DEBUG: Loader: Injecting process 4800 (thread 4832) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,661 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,661 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,661 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,661 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,661 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4800
2020-03-24 10:13:57,677 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5092
2020-03-24 10:13:57,691 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,691 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,691 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,691 [root] DEBUG: Loader: Injecting process 5092 (thread 5088) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,691 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,691 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,691 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,691 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,691 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5092
2020-03-24 10:13:57,707 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5092
2020-03-24 10:13:57,707 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,707 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,723 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,723 [root] DEBUG: Loader: Injecting process 5092 (thread 5088) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,723 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,723 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,723 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,723 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,723 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5092
2020-03-24 10:13:57,739 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4356
2020-03-24 10:13:57,739 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,739 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,739 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,739 [root] DEBUG: Loader: Injecting process 4356 (thread 4360) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,739 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,739 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,739 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,739 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,739 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4356
2020-03-24 10:13:57,755 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4356
2020-03-24 10:13:57,755 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,755 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,769 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,769 [root] DEBUG: Loader: Injecting process 4356 (thread 4360) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,769 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,769 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,769 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,769 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,769 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4356
2020-03-24 10:13:57,786 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4404
2020-03-24 10:13:57,786 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,786 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,786 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,786 [root] DEBUG: Loader: Injecting process 4404 (thread 4492) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,786 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,786 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,786 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,786 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,802 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4404
2020-03-24 10:13:57,802 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4404
2020-03-24 10:13:57,816 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,816 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,816 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,816 [root] DEBUG: Loader: Injecting process 4404 (thread 4492) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,816 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,816 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,816 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,816 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,816 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4404
2020-03-24 10:13:57,832 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4940
2020-03-24 10:13:57,832 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,832 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,832 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,832 [root] DEBUG: Loader: Injecting process 4940 (thread 4916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,832 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,832 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,832 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,832 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,848 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4940
2020-03-24 10:13:57,848 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4940
2020-03-24 10:13:57,848 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,848 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,864 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,864 [root] DEBUG: Loader: Injecting process 4940 (thread 4916) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,864 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,864 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,864 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,864 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,864 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4940
2020-03-24 10:13:57,880 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4192
2020-03-24 10:13:57,880 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,880 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,880 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,880 [root] DEBUG: Loader: Injecting process 4192 (thread 4128) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,880 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,880 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,880 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,880 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,880 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4192
2020-03-24 10:13:57,894 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4192
2020-03-24 10:13:57,894 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,894 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,911 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,911 [root] DEBUG: Loader: Injecting process 4192 (thread 4128) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,911 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,911 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,911 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,911 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,911 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4192
2020-03-24 10:13:57,926 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4552
2020-03-24 10:13:57,926 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,926 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,926 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,926 [root] DEBUG: Loader: Injecting process 4552 (thread 4548) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,926 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,926 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,926 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,926 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,941 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4552
2020-03-24 10:13:57,957 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4552
2020-03-24 10:13:57,957 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,957 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,957 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,957 [root] DEBUG: Loader: Injecting process 4552 (thread 4548) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,957 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,957 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,957 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:57,957 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,957 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4552
2020-03-24 10:13:57,973 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4776
2020-03-24 10:13:57,973 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,973 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:57,973 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:57,973 [root] DEBUG: Loader: Injecting process 4776 (thread 4744) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,973 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:57,973 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,973 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:57,973 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:57,973 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4776
2020-03-24 10:13:57,989 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4776
2020-03-24 10:13:57,989 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:57,989 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,003 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,003 [root] DEBUG: Loader: Injecting process 4776 (thread 4744) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,019 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,019 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,019 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,019 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,019 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4776
2020-03-24 10:13:58,036 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4924
2020-03-24 10:13:58,036 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,036 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,036 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,036 [root] DEBUG: Loader: Injecting process 4924 (thread 5016) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,051 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,051 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,051 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,051 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,051 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4924
2020-03-24 10:13:58,066 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4924
2020-03-24 10:13:58,066 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,066 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,066 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,066 [root] DEBUG: Loader: Injecting process 4924 (thread 5016) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,066 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,066 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,066 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,066 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,066 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4924
2020-03-24 10:13:58,098 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4392
2020-03-24 10:13:58,098 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,098 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,098 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,098 [root] DEBUG: Loader: Injecting process 4392 (thread 4364) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,098 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,098 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,098 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,098 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,114 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4392
2020-03-24 10:13:58,114 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4392
2020-03-24 10:13:58,114 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,114 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,128 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,128 [root] DEBUG: Loader: Injecting process 4392 (thread 4364) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,128 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,128 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,128 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,128 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,128 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4392
2020-03-24 10:13:58,144 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4984
2020-03-24 10:13:58,144 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,144 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,144 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,144 [root] DEBUG: Loader: Injecting process 4984 (thread 4932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,144 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,144 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,144 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,144 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,144 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4984
2020-03-24 10:13:58,160 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4984
2020-03-24 10:13:58,160 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,160 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,160 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,176 [root] DEBUG: Loader: Injecting process 4984 (thread 4932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,176 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,176 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,176 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,176 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,176 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4984
2020-03-24 10:13:58,191 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4268
2020-03-24 10:13:58,191 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,191 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,191 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,191 [root] DEBUG: Loader: Injecting process 4268 (thread 4536) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,191 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,191 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,191 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,191 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,207 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4268
2020-03-24 10:13:58,207 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4268
2020-03-24 10:13:58,207 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,207 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,223 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,223 [root] DEBUG: Loader: Injecting process 4268 (thread 4536) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,223 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,223 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,223 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,223 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,223 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4268
2020-03-24 10:13:58,237 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4988
2020-03-24 10:13:58,237 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,237 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,237 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,237 [root] DEBUG: Loader: Injecting process 4988 (thread 5024) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,237 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,237 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,237 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,237 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,237 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4988
2020-03-24 10:13:58,253 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4988
2020-03-24 10:13:58,253 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,253 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,253 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,253 [root] DEBUG: Loader: Injecting process 4988 (thread 5024) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,253 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,253 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,253 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,269 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,269 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4988
2020-03-24 10:13:58,285 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4912
2020-03-24 10:13:58,285 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,285 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,285 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,285 [root] DEBUG: Loader: Injecting process 4912 (thread 4876) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,285 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,285 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,285 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,285 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,285 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4912
2020-03-24 10:13:58,301 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4912
2020-03-24 10:13:58,301 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,301 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,301 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,301 [root] DEBUG: Loader: Injecting process 4912 (thread 4876) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,301 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,301 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,301 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,315 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,315 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4912
2020-03-24 10:13:58,332 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4204
2020-03-24 10:13:58,332 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,332 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,332 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,332 [root] DEBUG: Loader: Injecting process 4204 (thread 4880) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,332 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,332 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,332 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,332 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,332 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4204
2020-03-24 10:13:58,348 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4204
2020-03-24 10:13:58,348 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,348 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,362 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,362 [root] DEBUG: Loader: Injecting process 4204 (thread 4880) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,362 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,362 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,362 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,362 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,362 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4204
2020-03-24 10:13:58,378 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4704
2020-03-24 10:13:58,378 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,378 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,378 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,378 [root] DEBUG: Loader: Injecting process 4704 (thread 4432) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,378 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,378 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,378 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,378 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,378 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4704
2020-03-24 10:13:58,394 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4704
2020-03-24 10:13:58,410 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,410 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,410 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,410 [root] DEBUG: Loader: Injecting process 4704 (thread 4432) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,410 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,410 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,410 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,410 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,410 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4704
2020-03-24 10:13:58,426 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5028
2020-03-24 10:13:58,426 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,426 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,426 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,426 [root] DEBUG: Loader: Injecting process 5028 (thread 4196) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,426 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,426 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,426 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,426 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,440 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5028
2020-03-24 10:13:58,457 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5028
2020-03-24 10:13:58,457 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,457 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,457 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,457 [root] DEBUG: Loader: Injecting process 5028 (thread 4196) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,457 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,457 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,457 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,457 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,457 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5028
2020-03-24 10:13:58,471 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4296
2020-03-24 10:13:58,471 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,471 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,471 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,471 [root] DEBUG: Loader: Injecting process 4296 (thread 4648) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,487 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,487 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,487 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,487 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,487 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4296
2020-03-24 10:13:58,503 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4296
2020-03-24 10:13:58,503 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,503 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,503 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,503 [root] DEBUG: Loader: Injecting process 4296 (thread 4648) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,503 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,503 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,503 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,503 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,503 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4296
2020-03-24 10:13:58,535 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4636
2020-03-24 10:13:58,535 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,535 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,535 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,535 [root] DEBUG: Loader: Injecting process 4636 (thread 4780) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,535 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,535 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,535 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,535 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,535 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4636
2020-03-24 10:13:58,549 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4636
2020-03-24 10:13:58,549 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,549 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,549 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,549 [root] DEBUG: Loader: Injecting process 4636 (thread 4780) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,565 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,565 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,565 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,565 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,565 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4636
2020-03-24 10:13:58,582 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4656
2020-03-24 10:13:58,582 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,582 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,582 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,582 [root] DEBUG: Loader: Injecting process 4656 (thread 4936) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,582 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,582 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,582 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,582 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,582 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4656
2020-03-24 10:13:58,612 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4656
2020-03-24 10:13:58,612 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,612 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,612 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,612 [root] DEBUG: Loader: Injecting process 4656 (thread 4936) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,612 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,612 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,612 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,612 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,612 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4656
2020-03-24 10:13:58,644 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4136
2020-03-24 10:13:58,644 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,644 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,644 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,644 [root] DEBUG: Loader: Injecting process 4136 (thread 4256) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,644 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,644 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,644 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,644 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,644 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4136
2020-03-24 10:13:58,660 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4136
2020-03-24 10:13:58,660 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,660 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,674 [root] DEBUG: Loader: Injecting process 4136 (thread 4256) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,674 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,674 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,674 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,674 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,674 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4136
2020-03-24 10:13:58,690 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4644
2020-03-24 10:13:58,690 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,690 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,690 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,690 [root] DEBUG: Loader: Injecting process 4644 (thread 4140) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,690 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,690 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,690 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,690 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,690 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4644
2020-03-24 10:13:58,721 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4644
2020-03-24 10:13:58,721 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,721 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,721 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,721 [root] DEBUG: Loader: Injecting process 4644 (thread 4140) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,721 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,721 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,721 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,721 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,721 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4644
2020-03-24 10:13:58,737 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4748
2020-03-24 10:13:58,737 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,737 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,737 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,737 [root] DEBUG: Loader: Injecting process 4748 (thread 1412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,737 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,737 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,737 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,737 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,737 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4748
2020-03-24 10:13:58,753 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 4748
2020-03-24 10:13:58,753 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,753 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,769 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,769 [root] DEBUG: Loader: Injecting process 4748 (thread 1412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,769 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,769 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,769 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,769 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,769 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4748
2020-03-24 10:13:58,783 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5192
2020-03-24 10:13:58,783 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,783 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,783 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,783 [root] DEBUG: Loader: Injecting process 5192 (thread 5196) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,783 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,783 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,783 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,783 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,783 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5192
2020-03-24 10:13:58,799 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5192
2020-03-24 10:13:58,799 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,799 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,815 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,815 [root] DEBUG: Loader: Injecting process 5192 (thread 5196) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,815 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,815 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,815 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,815 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,815 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5192
2020-03-24 10:13:58,831 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5288
2020-03-24 10:13:58,831 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,831 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,831 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,831 [root] DEBUG: Loader: Injecting process 5288 (thread 5292) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,831 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,831 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,831 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,831 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,831 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5288
2020-03-24 10:13:58,846 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5288
2020-03-24 10:13:58,846 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,846 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,846 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,861 [root] DEBUG: Loader: Injecting process 5288 (thread 5292) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,861 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,861 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,861 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,861 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,861 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5288
2020-03-24 10:13:58,878 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5384
2020-03-24 10:13:58,878 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,878 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,878 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,878 [root] DEBUG: Loader: Injecting process 5384 (thread 5388) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,878 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,878 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,878 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,878 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,878 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5384
2020-03-24 10:13:58,894 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5384
2020-03-24 10:13:58,894 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,894 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,894 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,908 [root] DEBUG: Loader: Injecting process 5384 (thread 5388) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,908 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,908 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,908 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,908 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,908 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5384
2020-03-24 10:13:58,924 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5480
2020-03-24 10:13:58,924 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,924 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,924 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,924 [root] DEBUG: Loader: Injecting process 5480 (thread 5484) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,924 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,924 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,924 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,924 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,924 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5480
2020-03-24 10:13:58,940 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5480
2020-03-24 10:13:58,940 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,940 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,956 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,956 [root] DEBUG: Loader: Injecting process 5480 (thread 5484) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,956 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,956 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,956 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:58,956 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,956 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5480
2020-03-24 10:13:58,971 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5576
2020-03-24 10:13:58,971 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,971 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:58,971 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:58,971 [root] DEBUG: Loader: Injecting process 5576 (thread 5580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,971 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:58,971 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,971 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:58,971 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:58,971 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5576
2020-03-24 10:13:58,986 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5576
2020-03-24 10:13:58,986 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:58,986 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,003 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,003 [root] DEBUG: Loader: Injecting process 5576 (thread 5580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,003 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,003 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,003 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,003 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,003 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5576
2020-03-24 10:13:59,017 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5672
2020-03-24 10:13:59,017 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,017 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,017 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,017 [root] DEBUG: Loader: Injecting process 5672 (thread 5676) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,033 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,033 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,033 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,049 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,049 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5672
2020-03-24 10:13:59,049 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5672
2020-03-24 10:13:59,065 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,065 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,065 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,065 [root] DEBUG: Loader: Injecting process 5672 (thread 5676) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,065 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,065 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,065 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,065 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,065 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5672
2020-03-24 10:13:59,081 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5768
2020-03-24 10:13:59,081 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,081 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,081 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,081 [root] DEBUG: Loader: Injecting process 5768 (thread 5772) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,081 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,081 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,095 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,095 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,095 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5768
2020-03-24 10:13:59,095 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5768
2020-03-24 10:13:59,111 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,111 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,111 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,111 [root] DEBUG: Loader: Injecting process 5768 (thread 5772) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,111 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,111 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,111 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,111 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,111 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5768
2020-03-24 10:13:59,128 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5864
2020-03-24 10:13:59,128 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,128 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,128 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,128 [root] DEBUG: Loader: Injecting process 5864 (thread 5868) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,128 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,128 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,128 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,128 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,142 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5864
2020-03-24 10:13:59,142 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5864
2020-03-24 10:13:59,142 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,142 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,158 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,158 [root] DEBUG: Loader: Injecting process 5864 (thread 5868) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,158 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,158 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,158 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,158 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,158 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5864
2020-03-24 10:13:59,174 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5960
2020-03-24 10:13:59,174 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,174 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,174 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,174 [root] DEBUG: Loader: Injecting process 5960 (thread 5964) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,174 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,190 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,190 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,190 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,190 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5960
2020-03-24 10:13:59,206 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5960
2020-03-24 10:13:59,206 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,206 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,206 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,206 [root] DEBUG: Loader: Injecting process 5960 (thread 5964) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,206 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,206 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,206 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,206 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,206 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5960
2020-03-24 10:13:59,236 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6056
2020-03-24 10:13:59,236 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,236 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,236 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,236 [root] DEBUG: Loader: Injecting process 6056 (thread 6060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,236 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,236 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,236 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,236 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,236 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6056
2020-03-24 10:13:59,252 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6056
2020-03-24 10:13:59,252 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,252 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,267 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,267 [root] DEBUG: Loader: Injecting process 6056 (thread 6060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,267 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,267 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,267 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,267 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,267 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6056
2020-03-24 10:13:59,283 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5132
2020-03-24 10:13:59,283 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,283 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,283 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,283 [root] DEBUG: Loader: Injecting process 5132 (thread 5136) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,283 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,283 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,283 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,283 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,283 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5132
2020-03-24 10:13:59,299 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5132
2020-03-24 10:13:59,299 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,299 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,315 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,315 [root] DEBUG: Loader: Injecting process 5132 (thread 5136) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,329 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,329 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,329 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,329 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,329 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5132
2020-03-24 10:13:59,345 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5212
2020-03-24 10:13:59,345 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,345 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,345 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,345 [root] DEBUG: Loader: Injecting process 5212 (thread 5216) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,361 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,361 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,361 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,361 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,361 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5212
2020-03-24 10:13:59,377 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5212
2020-03-24 10:13:59,377 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,377 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,377 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,377 [root] DEBUG: Loader: Injecting process 5212 (thread 5216) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,377 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,377 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,392 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,392 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,392 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5212
2020-03-24 10:13:59,407 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5360
2020-03-24 10:13:59,407 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,407 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,407 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,407 [root] DEBUG: Loader: Injecting process 5360 (thread 5364) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,407 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,407 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,424 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,424 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,424 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5360
2020-03-24 10:13:59,440 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5360
2020-03-24 10:13:59,440 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,440 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,440 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,440 [root] DEBUG: Loader: Injecting process 5360 (thread 5364) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,440 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,440 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,440 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,440 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,454 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5360
2020-03-24 10:13:59,470 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5444
2020-03-24 10:13:59,470 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,470 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,470 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,470 [root] DEBUG: Loader: Injecting process 5444 (thread 5472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,470 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,470 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,470 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,470 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,486 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5444
2020-03-24 10:13:59,502 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5444
2020-03-24 10:13:59,502 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,502 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,502 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,502 [root] DEBUG: Loader: Injecting process 5444 (thread 5472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,502 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,502 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,502 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,502 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,502 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5444
2020-03-24 10:13:59,517 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5532
2020-03-24 10:13:59,517 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,517 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,517 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,517 [root] DEBUG: Loader: Injecting process 5532 (thread 5572) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,517 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,517 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,517 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,517 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,517 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5532
2020-03-24 10:13:59,532 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5532
2020-03-24 10:13:59,532 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,532 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,549 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,549 [root] DEBUG: Loader: Injecting process 5532 (thread 5572) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,549 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,549 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,549 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,549 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,549 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5532
2020-03-24 10:13:59,563 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5708
2020-03-24 10:13:59,563 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,563 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,563 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,563 [root] DEBUG: Loader: Injecting process 5708 (thread 5712) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,563 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,563 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,563 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,563 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,563 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5708
2020-03-24 10:13:59,579 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5708
2020-03-24 10:13:59,579 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,579 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,579 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,579 [root] DEBUG: Loader: Injecting process 5708 (thread 5712) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,579 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,579 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,579 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,579 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,579 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5708
2020-03-24 10:13:59,611 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5816
2020-03-24 10:13:59,611 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,611 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,611 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,611 [root] DEBUG: Loader: Injecting process 5816 (thread 5792) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,611 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,611 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,611 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,611 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5816
2020-03-24 10:13:59,627 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5816
2020-03-24 10:13:59,627 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,627 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,641 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,641 [root] DEBUG: Loader: Injecting process 5816 (thread 5792) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,641 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,641 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,641 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,641 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,641 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5816
2020-03-24 10:13:59,657 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5936
2020-03-24 10:13:59,657 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,657 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,657 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,657 [root] DEBUG: Loader: Injecting process 5936 (thread 5940) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,657 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,657 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,657 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,657 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,657 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5936
2020-03-24 10:13:59,674 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5936
2020-03-24 10:13:59,674 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,674 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,688 [root] DEBUG: Loader: Injecting process 5936 (thread 5940) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,688 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,688 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,688 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,688 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,688 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5936
2020-03-24 10:13:59,704 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6048
2020-03-24 10:13:59,704 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,704 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,704 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,704 [root] DEBUG: Loader: Injecting process 6048 (thread 6024) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,704 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,704 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,704 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,704 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,704 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6048
2020-03-24 10:13:59,720 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6048
2020-03-24 10:13:59,720 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,720 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,736 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,752 [root] DEBUG: Loader: Injecting process 6048 (thread 6024) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,752 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,752 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,752 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,752 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,752 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6048
2020-03-24 10:13:59,766 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6108
2020-03-24 10:13:59,766 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,766 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,766 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,766 [root] DEBUG: Loader: Injecting process 6108 (thread 5128) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,766 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,766 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,782 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,782 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,782 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6108
2020-03-24 10:13:59,782 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6108
2020-03-24 10:13:59,798 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,798 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,798 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,798 [root] DEBUG: Loader: Injecting process 6108 (thread 5128) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,798 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,798 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,798 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,798 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,798 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6108
2020-03-24 10:13:59,813 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5276
2020-03-24 10:13:59,813 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,813 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,813 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,813 [root] DEBUG: Loader: Injecting process 5276 (thread 5256) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,813 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,813 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,813 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,813 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,813 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5276
2020-03-24 10:13:59,829 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5276
2020-03-24 10:13:59,829 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,829 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,829 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,829 [root] DEBUG: Loader: Injecting process 5276 (thread 5256) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,845 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,845 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,845 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,845 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5276
2020-03-24 10:13:59,861 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5348
2020-03-24 10:13:59,861 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,861 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,861 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,861 [root] DEBUG: Loader: Injecting process 5348 (thread 5352) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,861 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,861 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,861 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,861 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5348
2020-03-24 10:13:59,891 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5348
2020-03-24 10:13:59,891 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,891 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,891 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,891 [root] DEBUG: Loader: Injecting process 5348 (thread 5352) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,891 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,891 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,907 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,907 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,907 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5348
2020-03-24 10:13:59,923 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5560
2020-03-24 10:13:59,923 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,923 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,923 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,923 [root] DEBUG: Loader: Injecting process 5560 (thread 5564) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,923 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,923 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,923 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,923 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,923 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5560
2020-03-24 10:13:59,938 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5560
2020-03-24 10:13:59,938 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,938 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,938 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,938 [root] DEBUG: Loader: Injecting process 5560 (thread 5564) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,938 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,938 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,938 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:13:59,938 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,938 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5560
2020-03-24 10:13:59,970 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5700
2020-03-24 10:13:59,970 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,970 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:13:59,970 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:13:59,970 [root] DEBUG: Loader: Injecting process 5700 (thread 5660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,970 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:13:59,970 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,970 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:13:59,970 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:13:59,970 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5700
2020-03-24 10:13:59,986 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5700
2020-03-24 10:13:59,986 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:13:59,986 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,000 [root] DEBUG: Loader: Injecting process 5700 (thread 5660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,000 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,000 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5700
2020-03-24 10:14:00,016 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5760
2020-03-24 10:14:00,016 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,016 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,016 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,016 [root] DEBUG: Loader: Injecting process 5760 (thread 5788) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,016 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,016 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,016 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,016 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,032 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5760
2020-03-24 10:14:00,032 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5760
2020-03-24 10:14:00,032 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,032 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,048 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,048 [root] DEBUG: Loader: Injecting process 5760 (thread 5788) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,048 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,048 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,048 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,048 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,048 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5760
2020-03-24 10:14:00,063 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5992
2020-03-24 10:14:00,063 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,063 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,063 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,063 [root] DEBUG: Loader: Injecting process 5992 (thread 5988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,078 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,078 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5992
2020-03-24 10:14:00,095 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5992
2020-03-24 10:14:00,095 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,095 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,095 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,095 [root] DEBUG: Loader: Injecting process 5992 (thread 5988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,095 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,095 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,095 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,109 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,109 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5992
2020-03-24 10:14:00,125 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6052
2020-03-24 10:14:00,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,125 [root] DEBUG: Loader: Injecting process 6052 (thread 6084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,125 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,125 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6052
2020-03-24 10:14:00,141 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6052
2020-03-24 10:14:00,141 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,141 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,157 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,157 [root] DEBUG: Loader: Injecting process 6052 (thread 6084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,157 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,157 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,157 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,157 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,157 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6052
2020-03-24 10:14:00,173 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5148
2020-03-24 10:14:00,173 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,173 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,173 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,173 [root] DEBUG: Loader: Injecting process 5148 (thread 5160) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,173 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,173 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,173 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,173 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,173 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5148
2020-03-24 10:14:00,187 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5148
2020-03-24 10:14:00,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,203 [root] DEBUG: Loader: Injecting process 5148 (thread 5160) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,203 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,203 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5148
2020-03-24 10:14:00,220 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5420
2020-03-24 10:14:00,220 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,220 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,220 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,220 [root] DEBUG: Loader: Injecting process 5420 (thread 5316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,220 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,220 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,220 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,220 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,220 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5420
2020-03-24 10:14:00,234 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5420
2020-03-24 10:14:00,234 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,234 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,250 [root] DEBUG: Loader: Injecting process 5420 (thread 5316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,250 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,250 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5420
2020-03-24 10:14:00,266 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5464
2020-03-24 10:14:00,266 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,266 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,266 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,266 [root] DEBUG: Loader: Injecting process 5464 (thread 5556) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,266 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,266 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,266 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,266 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,282 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5464
2020-03-24 10:14:00,282 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5464
2020-03-24 10:14:00,298 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,298 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,298 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,298 [root] DEBUG: Loader: Injecting process 5464 (thread 5556) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,298 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,298 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,298 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,298 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,298 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5464
2020-03-24 10:14:00,312 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5748
2020-03-24 10:14:00,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,312 [root] DEBUG: Loader: Injecting process 5748 (thread 5732) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,328 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,328 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5748
2020-03-24 10:14:00,344 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5748
2020-03-24 10:14:00,344 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,344 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,344 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,344 [root] DEBUG: Loader: Injecting process 5748 (thread 5732) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,344 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,344 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,344 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,359 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,359 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5748
2020-03-24 10:14:00,375 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5828
2020-03-24 10:14:00,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,375 [root] DEBUG: Loader: Injecting process 5828 (thread 5824) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,375 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,375 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5828
2020-03-24 10:14:00,391 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5828
2020-03-24 10:14:00,391 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,407 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,407 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,407 [root] DEBUG: Loader: Injecting process 5828 (thread 5824) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,407 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,407 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,407 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,407 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,407 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5828
2020-03-24 10:14:00,421 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6088
2020-03-24 10:14:00,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,421 [root] DEBUG: Loader: Injecting process 6088 (thread 6100) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,421 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,437 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6088
2020-03-24 10:14:00,453 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6088
2020-03-24 10:14:00,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,453 [root] DEBUG: Loader: Injecting process 6088 (thread 6100) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,453 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,453 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6088
2020-03-24 10:14:00,484 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5156
2020-03-24 10:14:00,484 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,484 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,484 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,484 [root] DEBUG: Loader: Injecting process 5156 (thread 4928) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,484 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,484 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,500 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5156
2020-03-24 10:14:00,516 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5156
2020-03-24 10:14:00,516 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,516 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,516 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,516 [root] DEBUG: Loader: Injecting process 5156 (thread 4928) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,516 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,516 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,516 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,516 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,532 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5156
2020-03-24 10:14:00,546 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5312
2020-03-24 10:14:00,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,546 [root] DEBUG: Loader: Injecting process 5312 (thread 5412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,546 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,546 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5312
2020-03-24 10:14:00,562 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5312
2020-03-24 10:14:00,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,578 [root] DEBUG: Loader: Injecting process 5312 (thread 5412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,578 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,578 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5312
2020-03-24 10:14:00,594 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5552
2020-03-24 10:14:00,594 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,594 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,594 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,594 [root] DEBUG: Loader: Injecting process 5552 (thread 5544) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,594 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,594 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,594 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,594 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,609 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5552
2020-03-24 10:14:00,609 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5552
2020-03-24 10:14:00,609 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,609 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,625 [root] DEBUG: Loader: Injecting process 5552 (thread 5544) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,625 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,625 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5552
2020-03-24 10:14:00,641 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5652
2020-03-24 10:14:00,641 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,641 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,641 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,641 [root] DEBUG: Loader: Injecting process 5652 (thread 5740) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,641 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,641 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,641 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,641 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,641 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5652
2020-03-24 10:14:00,655 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5652
2020-03-24 10:14:00,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,671 [root] DEBUG: Loader: Injecting process 5652 (thread 5740) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,671 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,671 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5652
2020-03-24 10:14:00,687 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6036
2020-03-24 10:14:00,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,687 [root] DEBUG: Loader: Injecting process 6036 (thread 6040) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,687 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,703 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6036
2020-03-24 10:14:00,719 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6036
2020-03-24 10:14:00,719 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,719 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,719 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,719 [root] DEBUG: Loader: Injecting process 6036 (thread 6040) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,719 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,719 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,719 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,719 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,719 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6036
2020-03-24 10:14:00,733 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5176
2020-03-24 10:14:00,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,733 [root] DEBUG: Loader: Injecting process 5176 (thread 5124) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,733 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,750 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5176
2020-03-24 10:14:00,766 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5176
2020-03-24 10:14:00,766 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,766 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,780 [root] DEBUG: Loader: Injecting process 5176 (thread 5124) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,780 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,780 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5176
2020-03-24 10:14:00,796 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5152
2020-03-24 10:14:00,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,796 [root] DEBUG: Loader: Injecting process 5152 (thread 5308) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,796 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,796 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5152
2020-03-24 10:14:00,812 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5152
2020-03-24 10:14:00,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,828 [root] DEBUG: Loader: Injecting process 5152 (thread 5308) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,828 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,828 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5152
2020-03-24 10:14:00,844 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5592
2020-03-24 10:14:00,844 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,844 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,844 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,858 [root] DEBUG: Loader: Injecting process 5592 (thread 5644) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,858 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,858 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5592
2020-03-24 10:14:00,875 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5592
2020-03-24 10:14:00,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,875 [root] DEBUG: Loader: Injecting process 5592 (thread 5644) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,875 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,890 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5592
2020-03-24 10:14:00,905 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5848
2020-03-24 10:14:00,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,905 [root] DEBUG: Loader: Injecting process 5848 (thread 5844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,905 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,905 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5848
2020-03-24 10:14:00,921 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5848
2020-03-24 10:14:00,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,937 [root] DEBUG: Loader: Injecting process 5848 (thread 5844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,937 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,937 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5848
2020-03-24 10:14:00,953 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6104
2020-03-24 10:14:00,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,953 [root] DEBUG: Loader: Injecting process 6104 (thread 6140) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,953 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:00,953 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6104
2020-03-24 10:14:00,967 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6104
2020-03-24 10:14:00,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:00,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:00,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:00,983 [root] DEBUG: Loader: Injecting process 6104 (thread 6140) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,983 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:00,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:00,983 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:00,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6104
2020-03-24 10:14:01,015 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5272
2020-03-24 10:14:01,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,015 [root] DEBUG: Loader: Injecting process 5272 (thread 5344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,015 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,015 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5272
2020-03-24 10:14:01,030 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5272
2020-03-24 10:14:01,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,046 [root] DEBUG: Loader: Injecting process 5272 (thread 5344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,046 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,046 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5272
2020-03-24 10:14:01,062 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5452
2020-03-24 10:14:01,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,062 [root] DEBUG: Loader: Injecting process 5452 (thread 5648) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,062 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,062 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5452
2020-03-24 10:14:01,078 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5452
2020-03-24 10:14:01,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,092 [root] DEBUG: Loader: Injecting process 5452 (thread 5648) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,092 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,092 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5452
2020-03-24 10:14:01,108 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5896
2020-03-24 10:14:01,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,108 [root] DEBUG: Loader: Injecting process 5896 (thread 5996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,108 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,108 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,124 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5896
2020-03-24 10:14:01,124 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5896
2020-03-24 10:14:01,124 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,124 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,140 [root] DEBUG: Loader: Injecting process 5896 (thread 5996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,140 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,140 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5896
2020-03-24 10:14:01,155 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6000
2020-03-24 10:14:01,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,155 [root] DEBUG: Loader: Injecting process 6000 (thread 6128) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,155 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,155 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,155 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6000
2020-03-24 10:14:01,171 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6000
2020-03-24 10:14:01,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,187 [root] DEBUG: Loader: Injecting process 6000 (thread 6128) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,187 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,187 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6000
2020-03-24 10:14:01,201 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5476
2020-03-24 10:14:01,201 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,201 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,201 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,201 [root] DEBUG: Loader: Injecting process 5476 (thread 5540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,201 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,201 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,201 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,201 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,201 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5476
2020-03-24 10:14:01,217 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5476
2020-03-24 10:14:01,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,217 [root] DEBUG: Loader: Injecting process 5476 (thread 5540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,233 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,233 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5476
2020-03-24 10:14:01,249 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5860
2020-03-24 10:14:01,249 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,249 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,249 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,249 [root] DEBUG: Loader: Injecting process 5860 (thread 5812) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,249 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,249 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,249 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,249 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,249 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5860
2020-03-24 10:14:01,265 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5860
2020-03-24 10:14:01,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,279 [root] DEBUG: Loader: Injecting process 5860 (thread 5812) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,279 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,279 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,279 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,279 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,279 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5860
2020-03-24 10:14:01,296 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5980
2020-03-24 10:14:01,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,296 [root] DEBUG: Loader: Injecting process 5980 (thread 5332) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,296 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,296 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5980
2020-03-24 10:14:01,312 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5980
2020-03-24 10:14:01,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,326 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,326 [root] DEBUG: Loader: Injecting process 5980 (thread 5332) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,326 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,326 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,326 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,326 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,326 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5980
2020-03-24 10:14:01,342 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5596
2020-03-24 10:14:01,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,342 [root] DEBUG: Loader: Injecting process 5596 (thread 5724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,342 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,342 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5596
2020-03-24 10:14:01,358 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5596
2020-03-24 10:14:01,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,374 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,374 [root] DEBUG: Loader: Injecting process 5596 (thread 5724) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,374 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,374 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,374 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,374 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,374 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5596
2020-03-24 10:14:01,390 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5932
2020-03-24 10:14:01,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,390 [root] DEBUG: Loader: Injecting process 5932 (thread 5984) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,390 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,390 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5932
2020-03-24 10:14:01,404 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5932
2020-03-24 10:14:01,404 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,404 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,404 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,404 [root] DEBUG: Loader: Injecting process 5932 (thread 5984) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,404 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,404 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,404 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,421 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5932
2020-03-24 10:14:01,436 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5280
2020-03-24 10:14:01,436 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,436 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,436 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,436 [root] DEBUG: Loader: Injecting process 5280 (thread 5508) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,436 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,436 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,436 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,436 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,436 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5280
2020-03-24 10:14:01,451 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5280
2020-03-24 10:14:01,451 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,451 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,451 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,451 [root] DEBUG: Loader: Injecting process 5280 (thread 5508) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,467 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,467 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5280
2020-03-24 10:14:01,483 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5764
2020-03-24 10:14:01,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,483 [root] DEBUG: Loader: Injecting process 5764 (thread 5600) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,483 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,483 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,499 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5764
2020-03-24 10:14:01,513 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5764
2020-03-24 10:14:01,513 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,513 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,513 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,513 [root] DEBUG: Loader: Injecting process 5764 (thread 5600) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,513 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,513 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,513 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,513 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,513 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5764
2020-03-24 10:14:01,529 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5524
2020-03-24 10:14:01,529 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,529 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,529 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,529 [root] DEBUG: Loader: Injecting process 5524 (thread 5456) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,529 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,529 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,529 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,529 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,529 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5524
2020-03-24 10:14:01,546 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5524
2020-03-24 10:14:01,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,561 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,561 [root] DEBUG: Loader: Injecting process 5524 (thread 5456) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,561 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,561 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,561 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,561 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,561 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5524
2020-03-24 10:14:01,576 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5912
2020-03-24 10:14:01,576 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,576 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,592 [root] DEBUG: Loader: Injecting process 5912 (thread 5252) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,592 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,592 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5912
2020-03-24 10:14:01,608 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5912
2020-03-24 10:14:01,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,608 [root] DEBUG: Loader: Injecting process 5912 (thread 5252) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,608 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,608 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,624 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5912
2020-03-24 10:14:01,638 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5628
2020-03-24 10:14:01,638 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,638 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,638 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,638 [root] DEBUG: Loader: Injecting process 5628 (thread 5796) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,638 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,638 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,638 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,638 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,638 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5628
2020-03-24 10:14:01,654 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5628
2020-03-24 10:14:01,654 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,654 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,670 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,670 [root] DEBUG: Loader: Injecting process 5628 (thread 5796) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,670 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,670 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,670 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,670 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,670 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5628
2020-03-24 10:14:01,686 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5516
2020-03-24 10:14:01,686 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,686 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,686 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,686 [root] DEBUG: Loader: Injecting process 5516 (thread 5460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,686 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,686 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,701 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,701 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,701 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5516
2020-03-24 10:14:01,701 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5516
2020-03-24 10:14:01,701 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,701 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,717 [root] DEBUG: Loader: Injecting process 5516 (thread 5460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,717 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,717 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5516
2020-03-24 10:14:01,733 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5340
2020-03-24 10:14:01,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,733 [root] DEBUG: Loader: Injecting process 5340 (thread 5380) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,733 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,733 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5340
2020-03-24 10:14:01,747 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5340
2020-03-24 10:14:01,747 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,747 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,747 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,763 [root] DEBUG: Loader: Injecting process 5340 (thread 5380) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,763 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,763 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,763 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,763 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,763 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5340
2020-03-24 10:14:01,779 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5228
2020-03-24 10:14:01,779 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,779 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,779 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,779 [root] DEBUG: Loader: Injecting process 5228 (thread 6080) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,779 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,779 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,779 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,779 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,779 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5228
2020-03-24 10:14:01,795 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5228
2020-03-24 10:14:01,811 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,811 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,811 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,811 [root] DEBUG: Loader: Injecting process 5228 (thread 6080) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,811 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,811 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,811 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,811 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,811 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5228
2020-03-24 10:14:01,825 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5232
2020-03-24 10:14:01,825 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,825 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,842 [root] DEBUG: Loader: Injecting process 5232 (thread 5888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,842 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,842 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5232
2020-03-24 10:14:01,872 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5232
2020-03-24 10:14:01,872 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,872 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,872 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,872 [root] DEBUG: Loader: Injecting process 5232 (thread 5888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,872 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,872 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,872 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,872 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,888 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5232
2020-03-24 10:14:01,904 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5520
2020-03-24 10:14:01,904 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,904 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,904 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,904 [root] DEBUG: Loader: Injecting process 5520 (thread 5220) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,904 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,904 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,920 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,920 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,920 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5520
2020-03-24 10:14:01,936 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5520
2020-03-24 10:14:01,936 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,936 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,936 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,936 [root] DEBUG: Loader: Injecting process 5520 (thread 5220) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,936 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,936 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,936 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,936 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,936 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5520
2020-03-24 10:14:01,967 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5924
2020-03-24 10:14:01,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,967 [root] DEBUG: Loader: Injecting process 5924 (thread 5632) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,967 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:01,967 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5924
2020-03-24 10:14:01,982 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5924
2020-03-24 10:14:01,982 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:01,982 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:01,997 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:01,997 [root] DEBUG: Loader: Injecting process 5924 (thread 5632) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,997 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:01,997 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,997 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:01,997 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:01,997 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5924
2020-03-24 10:14:02,029 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5504
2020-03-24 10:14:02,029 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,029 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,029 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,029 [root] DEBUG: Loader: Injecting process 5504 (thread 5408) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,029 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,029 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,029 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,029 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,029 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5504
2020-03-24 10:14:02,045 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 5504
2020-03-24 10:14:02,045 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,045 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,059 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,059 [root] DEBUG: Loader: Injecting process 5504 (thread 5408) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,059 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,059 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,059 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,059 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,059 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5504
2020-03-24 10:14:02,075 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6224
2020-03-24 10:14:02,075 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,075 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,075 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,075 [root] DEBUG: Loader: Injecting process 6224 (thread 6228) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,075 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,075 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,075 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,075 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,075 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6224
2020-03-24 10:14:02,092 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6224
2020-03-24 10:14:02,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,107 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,107 [root] DEBUG: Loader: Injecting process 6224 (thread 6228) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,107 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,107 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,107 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,107 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,107 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6224
2020-03-24 10:14:02,122 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6320
2020-03-24 10:14:02,122 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,122 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,122 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,138 [root] DEBUG: Loader: Injecting process 6320 (thread 6324) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,138 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,138 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,138 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,138 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,138 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6320
2020-03-24 10:14:02,154 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6320
2020-03-24 10:14:02,154 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,154 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,154 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,154 [root] DEBUG: Loader: Injecting process 6320 (thread 6324) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,154 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,154 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,154 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,154 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,170 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6320
2020-03-24 10:14:02,184 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6416
2020-03-24 10:14:02,184 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,184 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,184 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,184 [root] DEBUG: Loader: Injecting process 6416 (thread 6420) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,184 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,184 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,184 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,184 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,184 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6416
2020-03-24 10:14:02,200 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6416
2020-03-24 10:14:02,200 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,200 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,216 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,216 [root] DEBUG: Loader: Injecting process 6416 (thread 6420) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,216 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,216 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,216 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,216 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,216 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6416
2020-03-24 10:14:02,232 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6512
2020-03-24 10:14:02,232 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,232 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,232 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,232 [root] DEBUG: Loader: Injecting process 6512 (thread 6516) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,232 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,232 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,232 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,232 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,232 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6512
2020-03-24 10:14:02,247 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6512
2020-03-24 10:14:02,247 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,247 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,263 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,263 [root] DEBUG: Loader: Injecting process 6512 (thread 6516) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,263 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,263 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,263 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,263 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,263 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6512
2020-03-24 10:14:02,279 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6608
2020-03-24 10:14:02,279 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,279 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,279 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,279 [root] DEBUG: Loader: Injecting process 6608 (thread 6612) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,279 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,279 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,279 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,279 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,279 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6608
2020-03-24 10:14:02,293 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6608
2020-03-24 10:14:02,293 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,293 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,309 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,309 [root] DEBUG: Loader: Injecting process 6608 (thread 6612) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,309 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,309 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,309 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,309 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,309 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6608
2020-03-24 10:14:02,325 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6704
2020-03-24 10:14:02,325 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,325 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,325 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,325 [root] DEBUG: Loader: Injecting process 6704 (thread 6708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,325 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,325 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,341 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,341 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,341 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6704
2020-03-24 10:14:02,357 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6704
2020-03-24 10:14:02,357 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,357 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,357 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,357 [root] DEBUG: Loader: Injecting process 6704 (thread 6708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,357 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,357 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,357 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,357 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,357 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6704
2020-03-24 10:14:02,371 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6800
2020-03-24 10:14:02,371 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,371 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,371 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,371 [root] DEBUG: Loader: Injecting process 6800 (thread 6804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,371 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,371 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,388 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,388 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,388 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6800
2020-03-24 10:14:02,388 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6800
2020-03-24 10:14:02,388 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,388 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,404 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,404 [root] DEBUG: Loader: Injecting process 6800 (thread 6804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,404 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,404 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,404 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,404 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,404 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6800
2020-03-24 10:14:02,418 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6896
2020-03-24 10:14:02,418 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,418 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,418 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,418 [root] DEBUG: Loader: Injecting process 6896 (thread 6900) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,418 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,418 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,418 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,418 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,418 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6896
2020-03-24 10:14:02,434 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6896
2020-03-24 10:14:02,434 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,434 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,450 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,450 [root] DEBUG: Loader: Injecting process 6896 (thread 6900) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,450 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,450 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,450 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,450 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,450 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6896
2020-03-24 10:14:02,466 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6992
2020-03-24 10:14:02,466 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,466 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,466 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,466 [root] DEBUG: Loader: Injecting process 6992 (thread 6996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,466 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,466 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,466 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,466 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,466 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6992
2020-03-24 10:14:02,482 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6992
2020-03-24 10:14:02,482 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,482 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,482 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,482 [root] DEBUG: Loader: Injecting process 6992 (thread 6996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,496 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,496 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,496 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,496 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,496 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6992
2020-03-24 10:14:02,513 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7088
2020-03-24 10:14:02,513 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,513 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,513 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,513 [root] DEBUG: Loader: Injecting process 7088 (thread 7092) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,513 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,513 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,513 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,513 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,513 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7088
2020-03-24 10:14:02,528 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7088
2020-03-24 10:14:02,528 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,528 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,543 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,543 [root] DEBUG: Loader: Injecting process 7088 (thread 7092) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,543 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,543 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,543 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,543 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,543 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7088
2020-03-24 10:14:02,559 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6172
2020-03-24 10:14:02,559 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,559 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,559 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,559 [root] DEBUG: Loader: Injecting process 6172 (thread 6176) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,559 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,559 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,559 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,559 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,559 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6172
2020-03-24 10:14:02,575 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6172
2020-03-24 10:14:02,575 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,575 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,591 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,591 [root] DEBUG: Loader: Injecting process 6172 (thread 6176) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,591 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,591 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,591 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,591 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,591 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6172
2020-03-24 10:14:02,605 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6240
2020-03-24 10:14:02,605 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,605 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,605 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,605 [root] DEBUG: Loader: Injecting process 6240 (thread 6292) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,605 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,605 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,605 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,605 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,605 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6240
2020-03-24 10:14:02,621 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6240
2020-03-24 10:14:02,621 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,621 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,638 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,638 [root] DEBUG: Loader: Injecting process 6240 (thread 6292) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,638 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,638 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,638 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,638 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,638 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6240
2020-03-24 10:14:02,653 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6408
2020-03-24 10:14:02,653 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,653 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,653 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,653 [root] DEBUG: Loader: Injecting process 6408 (thread 6404) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,653 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,653 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,653 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,653 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,653 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6408
2020-03-24 10:14:02,668 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6408
2020-03-24 10:14:02,668 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,668 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,684 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,684 [root] DEBUG: Loader: Injecting process 6408 (thread 6404) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,684 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,684 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,684 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,684 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,684 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6408
2020-03-24 10:14:02,700 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6476
2020-03-24 10:14:02,700 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,700 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,700 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,700 [root] DEBUG: Loader: Injecting process 6476 (thread 6472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,700 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,700 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,700 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,700 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,700 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6476
2020-03-24 10:14:02,716 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6476
2020-03-24 10:14:02,716 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,716 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,716 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,730 [root] DEBUG: Loader: Injecting process 6476 (thread 6472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,730 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,730 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,730 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,730 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,730 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6476
2020-03-24 10:14:02,746 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6636
2020-03-24 10:14:02,746 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,746 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,746 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,746 [root] DEBUG: Loader: Injecting process 6636 (thread 6644) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,746 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,746 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,746 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,746 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,746 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6636
2020-03-24 10:14:02,762 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6636
2020-03-24 10:14:02,762 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,762 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,778 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,778 [root] DEBUG: Loader: Injecting process 6636 (thread 6644) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,778 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,778 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,778 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,778 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,778 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6636
2020-03-24 10:14:02,793 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6740
2020-03-24 10:14:02,793 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,793 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,809 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,809 [root] DEBUG: Loader: Injecting process 6740 (thread 6752) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,809 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,809 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,809 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,809 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,809 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6740
2020-03-24 10:14:02,839 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6740
2020-03-24 10:14:02,839 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,839 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,839 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,839 [root] DEBUG: Loader: Injecting process 6740 (thread 6752) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,839 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,839 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,839 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,839 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,839 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6740
2020-03-24 10:14:02,855 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6816
2020-03-24 10:14:02,855 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,855 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,855 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,855 [root] DEBUG: Loader: Injecting process 6816 (thread 6868) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,855 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,855 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,855 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,855 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,855 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-03-24 10:14:02,887 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6816
2020-03-24 10:14:02,887 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,887 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,887 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,887 [root] DEBUG: Loader: Injecting process 6816 (thread 6868) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,887 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,887 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,887 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,887 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,887 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-03-24 10:14:02,903 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6976
2020-03-24 10:14:02,903 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,903 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,903 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,903 [root] DEBUG: Loader: Injecting process 6976 (thread 6980) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,903 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,917 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,917 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,917 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6976
2020-03-24 10:14:02,934 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6976
2020-03-24 10:14:02,934 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,934 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,934 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,934 [root] DEBUG: Loader: Injecting process 6976 (thread 6980) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,934 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,934 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,934 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,934 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,934 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6976
2020-03-24 10:14:02,964 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7052
2020-03-24 10:14:02,964 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,964 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,964 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,964 [root] DEBUG: Loader: Injecting process 7052 (thread 7048) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,964 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,964 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,964 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:02,964 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,964 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7052
2020-03-24 10:14:02,980 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7052
2020-03-24 10:14:02,980 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:02,980 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:02,996 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:02,996 [root] DEBUG: Loader: Injecting process 7052 (thread 7048) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,996 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:02,996 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,996 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:02,996 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:02,996 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7052
2020-03-24 10:14:03,012 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6204
2020-03-24 10:14:03,012 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,012 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,012 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,012 [root] DEBUG: Loader: Injecting process 6204 (thread 6208) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,012 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,028 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,028 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,028 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,028 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6204
2020-03-24 10:14:03,042 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6204
2020-03-24 10:14:03,042 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,042 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,042 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,042 [root] DEBUG: Loader: Injecting process 6204 (thread 6208) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,042 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,042 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,042 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6204
2020-03-24 10:14:03,073 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6316
2020-03-24 10:14:03,073 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,073 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,073 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,073 [root] DEBUG: Loader: Injecting process 6316 (thread 6348) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,073 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,073 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,089 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,089 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,089 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6316
2020-03-24 10:14:03,105 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6316
2020-03-24 10:14:03,105 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,105 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,105 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,105 [root] DEBUG: Loader: Injecting process 6316 (thread 6348) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,105 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,105 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,105 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,105 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,105 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6316
2020-03-24 10:14:03,137 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6384
2020-03-24 10:14:03,137 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,137 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,137 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,137 [root] DEBUG: Loader: Injecting process 6384 (thread 6484) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,137 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,137 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,137 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,137 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,137 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6384
2020-03-24 10:14:03,151 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6384
2020-03-24 10:14:03,151 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,151 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,167 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,167 [root] DEBUG: Loader: Injecting process 6384 (thread 6484) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,167 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,167 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,167 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,167 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,167 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6384
2020-03-24 10:14:03,184 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6576
2020-03-24 10:14:03,184 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,184 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,184 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,184 [root] DEBUG: Loader: Injecting process 6576 (thread 6568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,184 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,184 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,184 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,184 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,184 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6576
2020-03-24 10:14:03,198 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6576
2020-03-24 10:14:03,198 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,198 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,214 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,214 [root] DEBUG: Loader: Injecting process 6576 (thread 6568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,214 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,214 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,214 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,214 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,214 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6576
2020-03-24 10:14:03,230 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6672
2020-03-24 10:14:03,230 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,230 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,230 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,230 [root] DEBUG: Loader: Injecting process 6672 (thread 6696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,230 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,230 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,230 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,230 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,246 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6672
2020-03-24 10:14:03,246 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6672
2020-03-24 10:14:03,246 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,262 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,262 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,262 [root] DEBUG: Loader: Injecting process 6672 (thread 6696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,262 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,262 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,262 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,262 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,262 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6672
2020-03-24 10:14:03,276 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6864
2020-03-24 10:14:03,276 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,276 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,276 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,276 [root] DEBUG: Loader: Injecting process 6864 (thread 6892) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,276 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,276 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,276 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,276 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,276 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6864
2020-03-24 10:14:03,292 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6864
2020-03-24 10:14:03,292 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,292 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,308 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,308 [root] DEBUG: Loader: Injecting process 6864 (thread 6892) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,308 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,308 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,308 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,308 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,308 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6864
2020-03-24 10:14:03,323 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7032
2020-03-24 10:14:03,323 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,323 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,323 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,323 [root] DEBUG: Loader: Injecting process 7032 (thread 7036) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,323 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,323 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,323 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,339 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,339 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7032
2020-03-24 10:14:03,355 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7032
2020-03-24 10:14:03,355 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,355 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,355 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,355 [root] DEBUG: Loader: Injecting process 7032 (thread 7036) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,355 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,355 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,355 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,355 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,355 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7032
2020-03-24 10:14:03,385 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7116
2020-03-24 10:14:03,385 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,385 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,401 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,401 [root] DEBUG: Loader: Injecting process 7116 (thread 6160) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,401 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,401 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,401 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,401 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,401 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7116
2020-03-24 10:14:03,417 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7116
2020-03-24 10:14:03,417 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,417 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,417 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,417 [root] DEBUG: Loader: Injecting process 7116 (thread 6160) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,417 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,433 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,433 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,433 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,433 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7116
2020-03-24 10:14:03,448 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6252
2020-03-24 10:14:03,448 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,448 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,448 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,448 [root] DEBUG: Loader: Injecting process 6252 (thread 6280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,448 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,448 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,448 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,448 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,448 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6252
2020-03-24 10:14:03,463 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6252
2020-03-24 10:14:03,463 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,463 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,480 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,480 [root] DEBUG: Loader: Injecting process 6252 (thread 6280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,480 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,480 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,480 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,480 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,480 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6252
2020-03-24 10:14:03,496 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6396
2020-03-24 10:14:03,496 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,496 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,496 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,496 [root] DEBUG: Loader: Injecting process 6396 (thread 6356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,496 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,496 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,496 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,496 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,510 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6396
2020-03-24 10:14:03,526 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6396
2020-03-24 10:14:03,526 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,526 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,526 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,526 [root] DEBUG: Loader: Injecting process 6396 (thread 6356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,526 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,526 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,526 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,526 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,526 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6396
2020-03-24 10:14:03,542 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6604
2020-03-24 10:14:03,542 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,542 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,542 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,542 [root] DEBUG: Loader: Injecting process 6604 (thread 6680) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,542 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,542 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,558 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,558 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,558 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6604
2020-03-24 10:14:03,573 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6604
2020-03-24 10:14:03,573 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,573 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,573 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,573 [root] DEBUG: Loader: Injecting process 6604 (thread 6680) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,573 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,573 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,573 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,573 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,573 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6604
2020-03-24 10:14:03,588 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6776
2020-03-24 10:14:03,588 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,588 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,588 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,588 [root] DEBUG: Loader: Injecting process 6776 (thread 6720) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,588 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,588 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,588 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,588 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,588 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6776
2020-03-24 10:14:03,605 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6776
2020-03-24 10:14:03,605 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,605 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,619 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,619 [root] DEBUG: Loader: Injecting process 6776 (thread 6720) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,619 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,619 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,619 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,619 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,619 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6776
2020-03-24 10:14:03,635 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6860
2020-03-24 10:14:03,635 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,635 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,635 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,635 [root] DEBUG: Loader: Injecting process 6860 (thread 6932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,635 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,635 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,635 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,635 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,635 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6860
2020-03-24 10:14:03,651 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6860
2020-03-24 10:14:03,651 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,651 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,651 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,651 [root] DEBUG: Loader: Injecting process 6860 (thread 6932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,651 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,667 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,667 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,667 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,667 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6860
2020-03-24 10:14:03,683 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7120
2020-03-24 10:14:03,683 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,683 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,683 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,697 [root] DEBUG: Loader: Injecting process 7120 (thread 7108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,697 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,697 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,697 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,697 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,697 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7120
2020-03-24 10:14:03,713 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7120
2020-03-24 10:14:03,713 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,713 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,713 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,713 [root] DEBUG: Loader: Injecting process 7120 (thread 7108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,713 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,713 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,713 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,713 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,713 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7120
2020-03-24 10:14:03,744 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6268
2020-03-24 10:14:03,744 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,744 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,744 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,744 [root] DEBUG: Loader: Injecting process 6268 (thread 6196) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,744 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,744 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,744 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,744 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,760 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6268
2020-03-24 10:14:03,760 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6268
2020-03-24 10:14:03,760 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,760 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,776 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,776 [root] DEBUG: Loader: Injecting process 6268 (thread 6196) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,776 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,776 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,776 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,776 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,776 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6268
2020-03-24 10:14:03,792 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6464
2020-03-24 10:14:03,792 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,792 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,792 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,792 [root] DEBUG: Loader: Injecting process 6464 (thread 6480) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,792 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,792 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,792 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,792 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,808 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6464
2020-03-24 10:14:03,808 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6464
2020-03-24 10:14:03,808 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,808 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,822 [root] DEBUG: Loader: Injecting process 6464 (thread 6480) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,822 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,822 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,822 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,822 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6464
2020-03-24 10:14:03,838 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6732
2020-03-24 10:14:03,838 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,838 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,838 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,838 [root] DEBUG: Loader: Injecting process 6732 (thread 6684) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,838 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,838 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,838 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,838 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,838 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6732
2020-03-24 10:14:03,869 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6732
2020-03-24 10:14:03,869 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,869 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,869 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,869 [root] DEBUG: Loader: Injecting process 6732 (thread 6684) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,869 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,869 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,869 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,869 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,869 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6732
2020-03-24 10:14:03,885 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6780
2020-03-24 10:14:03,885 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,885 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,885 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,885 [root] DEBUG: Loader: Injecting process 6780 (thread 6880) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,885 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,885 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,885 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,885 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,885 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6780
2020-03-24 10:14:03,901 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6780
2020-03-24 10:14:03,901 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,901 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,917 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,917 [root] DEBUG: Loader: Injecting process 6780 (thread 6880) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,917 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,917 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,917 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,917 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6780
2020-03-24 10:14:03,931 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6960
2020-03-24 10:14:03,931 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,931 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,947 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,947 [root] DEBUG: Loader: Injecting process 6960 (thread 7132) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,947 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,947 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,947 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,947 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,947 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6960
2020-03-24 10:14:03,963 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6960
2020-03-24 10:14:03,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,963 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,963 [root] DEBUG: Loader: Injecting process 6960 (thread 7132) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,963 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,963 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,979 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:03,979 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,979 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6960
2020-03-24 10:14:03,994 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7140
2020-03-24 10:14:03,994 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:03,994 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:03,994 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:03,994 [root] DEBUG: Loader: Injecting process 7140 (thread 7144) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,994 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:03,994 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,994 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:03,994 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:03,994 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7140
2020-03-24 10:14:04,009 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7140
2020-03-24 10:14:04,009 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,009 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,026 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,026 [root] DEBUG: Loader: Injecting process 7140 (thread 7144) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,026 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,026 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,026 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,026 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,026 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7140
2020-03-24 10:14:04,042 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6436
2020-03-24 10:14:04,042 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,042 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,042 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,042 [root] DEBUG: Loader: Injecting process 6436 (thread 6432) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,056 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,056 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,056 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,056 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6436
2020-03-24 10:14:04,072 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6436
2020-03-24 10:14:04,072 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,072 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,072 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,072 [root] DEBUG: Loader: Injecting process 6436 (thread 6432) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,072 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,072 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,072 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,072 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,072 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6436
2020-03-24 10:14:04,088 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6792
2020-03-24 10:14:04,088 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,088 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,088 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,088 [root] DEBUG: Loader: Injecting process 6792 (thread 6652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,088 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,104 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,104 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,104 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,104 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6792
2020-03-24 10:14:04,119 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6792
2020-03-24 10:14:04,119 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,119 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,119 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,119 [root] DEBUG: Loader: Injecting process 6792 (thread 6652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,119 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,119 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,119 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,119 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,119 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6792
2020-03-24 10:14:04,151 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6920
2020-03-24 10:14:04,151 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,151 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,165 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,165 [root] DEBUG: Loader: Injecting process 6920 (thread 7072) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,165 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,165 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,165 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,165 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,165 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6920
2020-03-24 10:14:04,181 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6920
2020-03-24 10:14:04,181 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,181 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,197 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,197 [root] DEBUG: Loader: Injecting process 6920 (thread 7072) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,197 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,197 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,197 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,197 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,197 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6920
2020-03-24 10:14:04,213 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6192
2020-03-24 10:14:04,213 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,213 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,213 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,213 [root] DEBUG: Loader: Injecting process 6192 (thread 6180) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,213 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,213 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,213 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,229 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,229 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6192
2020-03-24 10:14:04,243 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6192
2020-03-24 10:14:04,243 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,243 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,243 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,243 [root] DEBUG: Loader: Injecting process 6192 (thread 6180) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,243 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,243 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,243 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,243 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,243 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6192
2020-03-24 10:14:04,276 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6304
2020-03-24 10:14:04,276 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,276 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,276 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,276 [root] DEBUG: Loader: Injecting process 6304 (thread 6376) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,276 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,276 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,276 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,276 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,276 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6304
2020-03-24 10:14:04,290 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6304
2020-03-24 10:14:04,290 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,290 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,306 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,306 [root] DEBUG: Loader: Injecting process 6304 (thread 6376) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,306 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,306 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,306 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,306 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,306 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6304
2020-03-24 10:14:04,322 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6760
2020-03-24 10:14:04,322 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,322 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,322 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,322 [root] DEBUG: Loader: Injecting process 6760 (thread 6844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,322 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,322 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,338 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,338 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,338 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6760
2020-03-24 10:14:04,338 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6760
2020-03-24 10:14:04,354 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,354 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,354 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,354 [root] DEBUG: Loader: Injecting process 6760 (thread 6844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,354 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,354 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,354 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,354 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,354 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6760
2020-03-24 10:14:04,368 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7064
2020-03-24 10:14:04,368 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,368 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,368 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,368 [root] DEBUG: Loader: Injecting process 7064 (thread 6936) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,368 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,368 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,368 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,368 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,384 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7064
2020-03-24 10:14:04,384 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7064
2020-03-24 10:14:04,384 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,384 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,400 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,400 [root] DEBUG: Loader: Injecting process 7064 (thread 6936) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,400 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,400 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,400 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,400 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,400 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7064
2020-03-24 10:14:04,415 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7016
2020-03-24 10:14:04,415 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,415 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,415 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,415 [root] DEBUG: Loader: Injecting process 7016 (thread 6368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,415 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,415 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,415 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,415 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,415 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7016
2020-03-24 10:14:04,431 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7016
2020-03-24 10:14:04,431 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,431 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,447 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,447 [root] DEBUG: Loader: Injecting process 7016 (thread 6368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,447 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,447 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,447 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,447 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,447 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7016
2020-03-24 10:14:04,463 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6544
2020-03-24 10:14:04,463 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,463 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,463 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,463 [root] DEBUG: Loader: Injecting process 6544 (thread 6664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,463 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,463 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,463 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,463 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,463 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6544
2020-03-24 10:14:04,477 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6544
2020-03-24 10:14:04,477 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,477 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,493 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,493 [root] DEBUG: Loader: Injecting process 6544 (thread 6664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,493 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,493 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,493 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,493 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,493 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6544
2020-03-24 10:14:04,509 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6884
2020-03-24 10:14:04,509 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,509 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,509 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,509 [root] DEBUG: Loader: Injecting process 6884 (thread 6888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,509 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,509 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,509 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,509 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,509 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6884
2020-03-24 10:14:04,525 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6884
2020-03-24 10:14:04,525 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,525 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,525 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,525 [root] DEBUG: Loader: Injecting process 6884 (thread 6888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,525 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,525 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,540 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,540 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,540 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6884
2020-03-24 10:14:04,555 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6364
2020-03-24 10:14:04,555 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,555 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,555 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,555 [root] DEBUG: Loader: Injecting process 6364 (thread 6336) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,555 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,555 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,555 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,555 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,555 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6364
2020-03-24 10:14:04,572 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6364
2020-03-24 10:14:04,572 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,572 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,572 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,572 [root] DEBUG: Loader: Injecting process 6364 (thread 6336) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,572 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,572 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,588 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,588 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,588 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6364
2020-03-24 10:14:04,602 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6924
2020-03-24 10:14:04,602 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,602 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,602 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,618 [root] DEBUG: Loader: Injecting process 6924 (thread 6560) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,618 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,618 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,618 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,618 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,618 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6924
2020-03-24 10:14:04,634 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6924
2020-03-24 10:14:04,634 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,634 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,634 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,634 [root] DEBUG: Loader: Injecting process 6924 (thread 6560) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,634 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,634 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,634 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,634 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,650 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6924
2020-03-24 10:14:04,665 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7076
2020-03-24 10:14:04,665 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,665 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,665 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,665 [root] DEBUG: Loader: Injecting process 7076 (thread 6276) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,665 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,665 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,665 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,665 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,665 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7076
2020-03-24 10:14:04,680 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7076
2020-03-24 10:14:04,680 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,680 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,697 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,697 [root] DEBUG: Loader: Injecting process 7076 (thread 6276) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,697 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,697 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,697 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,697 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,697 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7076
2020-03-24 10:14:04,711 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6628
2020-03-24 10:14:04,711 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,711 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,711 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,711 [root] DEBUG: Loader: Injecting process 6628 (thread 6756) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,711 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,711 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,711 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,711 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,711 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6628
2020-03-24 10:14:04,727 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6628
2020-03-24 10:14:04,727 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,727 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,727 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,743 [root] DEBUG: Loader: Injecting process 6628 (thread 6756) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,743 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,743 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,743 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,743 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,743 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6628
2020-03-24 10:14:04,759 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6848
2020-03-24 10:14:04,759 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,759 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,759 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,759 [root] DEBUG: Loader: Injecting process 6848 (thread 6784) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,759 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,759 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,759 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,759 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,775 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6848
2020-03-24 10:14:04,775 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6848
2020-03-24 10:14:04,775 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,775 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,789 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,789 [root] DEBUG: Loader: Injecting process 6848 (thread 6784) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,789 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,789 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,789 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,789 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,789 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6848
2020-03-24 10:14:04,805 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6820
2020-03-24 10:14:04,805 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,805 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,805 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,805 [root] DEBUG: Loader: Injecting process 6820 (thread 6912) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,805 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,805 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,805 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,805 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,805 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6820
2020-03-24 10:14:04,822 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6820
2020-03-24 10:14:04,822 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,822 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,822 [root] DEBUG: Loader: Injecting process 6820 (thread 6912) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,836 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,836 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,836 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,836 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6820
2020-03-24 10:14:04,852 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7128
2020-03-24 10:14:04,852 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,852 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,852 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,852 [root] DEBUG: Loader: Injecting process 7128 (thread 6188) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,852 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,868 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,868 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,868 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,868 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7128
2020-03-24 10:14:04,884 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7128
2020-03-24 10:14:04,884 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,884 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,900 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,900 [root] DEBUG: Loader: Injecting process 7128 (thread 6188) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,900 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,900 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,900 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,900 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,900 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7128
2020-03-24 10:14:04,914 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7112
2020-03-24 10:14:04,914 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,914 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,914 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,914 [root] DEBUG: Loader: Injecting process 7112 (thread 6824) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,914 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,914 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,914 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,914 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,914 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7112
2020-03-24 10:14:04,946 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7112
2020-03-24 10:14:04,946 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,946 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,946 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,946 [root] DEBUG: Loader: Injecting process 7112 (thread 6824) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,946 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,946 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,946 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:04,946 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,946 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7112
2020-03-24 10:14:04,977 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6988
2020-03-24 10:14:04,977 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,977 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:04,977 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:04,977 [root] DEBUG: Loader: Injecting process 6988 (thread 7160) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,977 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:04,977 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,977 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:04,977 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:04,977 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6988
2020-03-24 10:14:04,993 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6988
2020-03-24 10:14:04,993 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:04,993 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,009 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,009 [root] DEBUG: Loader: Injecting process 6988 (thread 7160) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,009 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,009 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,009 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,009 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,009 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6988
2020-03-24 10:14:05,023 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6528
2020-03-24 10:14:05,023 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,023 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,023 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,023 [root] DEBUG: Loader: Injecting process 6528 (thread 6552) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,023 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,023 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,023 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,023 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,023 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6528
2020-03-24 10:14:05,039 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6528
2020-03-24 10:14:05,039 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,039 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,055 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,055 [root] DEBUG: Loader: Injecting process 6528 (thread 6552) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,055 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,055 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,055 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,055 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,055 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6528
2020-03-24 10:14:05,071 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7068
2020-03-24 10:14:05,071 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,071 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,071 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,071 [root] DEBUG: Loader: Injecting process 7068 (thread 6736) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,071 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,071 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,086 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,086 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,086 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7068
2020-03-24 10:14:05,101 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7068
2020-03-24 10:14:05,101 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,101 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,101 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,101 [root] DEBUG: Loader: Injecting process 7068 (thread 6736) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,101 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,101 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,101 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,118 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,118 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7068
2020-03-24 10:14:05,134 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6244
2020-03-24 10:14:05,134 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,134 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,134 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,134 [root] DEBUG: Loader: Injecting process 6244 (thread 6168) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,134 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,134 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,134 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,134 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,134 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6244
2020-03-24 10:14:05,148 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6244
2020-03-24 10:14:05,148 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,148 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,164 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,164 [root] DEBUG: Loader: Injecting process 6244 (thread 6168) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,164 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,164 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,164 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,164 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,164 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6244
2020-03-24 10:14:05,180 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6440
2020-03-24 10:14:05,180 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,180 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,180 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,180 [root] DEBUG: Loader: Injecting process 6440 (thread 7080) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,180 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,180 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,196 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,196 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,196 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6440
2020-03-24 10:14:05,211 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6440
2020-03-24 10:14:05,211 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,211 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,211 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,211 [root] DEBUG: Loader: Injecting process 6440 (thread 7080) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,211 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,211 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,226 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,226 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6440
2020-03-24 10:14:05,243 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6344
2020-03-24 10:14:05,243 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,243 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,243 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,243 [root] DEBUG: Loader: Injecting process 6344 (thread 6788) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,243 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,243 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,243 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,243 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,243 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6344
2020-03-24 10:14:05,257 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6344
2020-03-24 10:14:05,257 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,257 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,273 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,273 [root] DEBUG: Loader: Injecting process 6344 (thread 6788) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,273 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,273 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,273 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,273 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,273 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6344
2020-03-24 10:14:05,289 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7224
2020-03-24 10:14:05,289 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,289 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,289 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,289 [root] DEBUG: Loader: Injecting process 7224 (thread 7228) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,289 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,289 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,289 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,289 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,289 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7224
2020-03-24 10:14:05,305 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7224
2020-03-24 10:14:05,305 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,305 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,321 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,321 [root] DEBUG: Loader: Injecting process 7224 (thread 7228) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,321 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,321 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,321 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,321 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,321 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7224
2020-03-24 10:14:05,335 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7320
2020-03-24 10:14:05,335 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,335 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,335 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,335 [root] DEBUG: Loader: Injecting process 7320 (thread 7324) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,335 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,335 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,335 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,335 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,335 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7320
2020-03-24 10:14:05,351 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7320
2020-03-24 10:14:05,351 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,351 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,368 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,368 [root] DEBUG: Loader: Injecting process 7320 (thread 7324) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,368 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,368 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,368 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,368 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,368 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7320
2020-03-24 10:14:05,382 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7416
2020-03-24 10:14:05,382 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,382 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,382 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,382 [root] DEBUG: Loader: Injecting process 7416 (thread 7420) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,382 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,382 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,382 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,382 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,382 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7416
2020-03-24 10:14:05,398 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7416
2020-03-24 10:14:05,398 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,398 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,398 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,398 [root] DEBUG: Loader: Injecting process 7416 (thread 7420) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,398 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,398 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,414 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,414 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,414 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7416
2020-03-24 10:14:05,430 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7512
2020-03-24 10:14:05,430 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,430 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,430 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,430 [root] DEBUG: Loader: Injecting process 7512 (thread 7516) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,430 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,430 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,430 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,430 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,430 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7512
2020-03-24 10:14:05,446 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7512
2020-03-24 10:14:05,446 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,446 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,460 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,460 [root] DEBUG: Loader: Injecting process 7512 (thread 7516) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,460 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,460 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,460 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,460 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,460 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7512
2020-03-24 10:14:05,476 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7608
2020-03-24 10:14:05,476 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,476 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,476 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,476 [root] DEBUG: Loader: Injecting process 7608 (thread 7612) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,476 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,476 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,476 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,476 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,476 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7608
2020-03-24 10:14:05,492 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7608
2020-03-24 10:14:05,492 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,492 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,507 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,507 [root] DEBUG: Loader: Injecting process 7608 (thread 7612) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,507 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,507 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,507 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,507 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,507 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7608
2020-03-24 10:14:05,523 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7704
2020-03-24 10:14:05,523 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,523 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,523 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,523 [root] DEBUG: Loader: Injecting process 7704 (thread 7708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,523 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,523 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,523 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,523 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,539 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7704
2020-03-24 10:14:05,539 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7704
2020-03-24 10:14:05,539 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,539 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,555 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,555 [root] DEBUG: Loader: Injecting process 7704 (thread 7708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,555 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,555 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,555 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,555 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,555 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7704
2020-03-24 10:14:05,569 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7800
2020-03-24 10:14:05,569 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,569 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,569 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,569 [root] DEBUG: Loader: Injecting process 7800 (thread 7804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,569 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,569 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,569 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,569 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,569 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7800
2020-03-24 10:14:05,585 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7800
2020-03-24 10:14:05,585 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,585 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,601 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,601 [root] DEBUG: Loader: Injecting process 7800 (thread 7804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,601 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,601 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,601 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,601 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,601 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7800
2020-03-24 10:14:05,617 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7896
2020-03-24 10:14:05,617 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,617 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,617 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,617 [root] DEBUG: Loader: Injecting process 7896 (thread 7900) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,617 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,617 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,617 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,617 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,617 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7896
2020-03-24 10:14:05,632 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7896
2020-03-24 10:14:05,632 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,632 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,648 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,648 [root] DEBUG: Loader: Injecting process 7896 (thread 7900) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,648 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,648 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,648 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,648 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,648 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7896
2020-03-24 10:14:05,664 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7992
2020-03-24 10:14:05,664 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,664 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,664 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,664 [root] DEBUG: Loader: Injecting process 7992 (thread 7996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,664 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,664 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,664 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,664 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,664 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-03-24 10:14:05,680 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7992
2020-03-24 10:14:05,680 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,680 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,680 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,694 [root] DEBUG: Loader: Injecting process 7992 (thread 7996) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,694 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,694 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,694 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,694 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,694 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-03-24 10:14:05,710 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8088
2020-03-24 10:14:05,710 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,710 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,710 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,710 [root] DEBUG: Loader: Injecting process 8088 (thread 8092) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,710 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,710 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,710 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,710 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,710 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8088
2020-03-24 10:14:05,726 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8088
2020-03-24 10:14:05,726 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,726 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,726 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,726 [root] DEBUG: Loader: Injecting process 8088 (thread 8092) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,726 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,742 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,742 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,742 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,742 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8088
2020-03-24 10:14:05,757 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8184
2020-03-24 10:14:05,757 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,757 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,757 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,757 [root] DEBUG: Loader: Injecting process 8184 (thread 8188) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,757 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,757 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,757 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,757 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,757 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8184
2020-03-24 10:14:05,773 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8184
2020-03-24 10:14:05,773 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,773 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,773 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,789 [root] DEBUG: Loader: Injecting process 8184 (thread 8188) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,789 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,789 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,789 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,789 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,789 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8184
2020-03-24 10:14:05,803 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7272
2020-03-24 10:14:05,803 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,803 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,803 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,803 [root] DEBUG: Loader: Injecting process 7272 (thread 7248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,803 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,803 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,803 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,803 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,803 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7272
2020-03-24 10:14:05,819 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7272
2020-03-24 10:14:05,819 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,819 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,835 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,835 [root] DEBUG: Loader: Injecting process 7272 (thread 7248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,835 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,835 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,835 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,835 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,835 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7272
2020-03-24 10:14:05,851 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7388
2020-03-24 10:14:05,851 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,851 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,851 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,851 [root] DEBUG: Loader: Injecting process 7388 (thread 7392) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,851 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,851 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,851 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,851 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,851 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7388
2020-03-24 10:14:05,867 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7388
2020-03-24 10:14:05,867 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,867 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,881 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,881 [root] DEBUG: Loader: Injecting process 7388 (thread 7392) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,881 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,881 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,881 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,881 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,881 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7388
2020-03-24 10:14:05,898 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7500
2020-03-24 10:14:05,898 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,898 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,898 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,898 [root] DEBUG: Loader: Injecting process 7500 (thread 7504) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,898 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,898 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,898 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,898 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,898 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7500
2020-03-24 10:14:05,928 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7500
2020-03-24 10:14:05,928 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,928 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,928 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,928 [root] DEBUG: Loader: Injecting process 7500 (thread 7504) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,928 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,928 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,928 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,928 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,928 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7500
2020-03-24 10:14:05,944 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7568
2020-03-24 10:14:05,944 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,944 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,944 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,944 [root] DEBUG: Loader: Injecting process 7568 (thread 7564) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,944 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,944 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,944 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,944 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,944 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7568
2020-03-24 10:14:05,960 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7568
2020-03-24 10:14:05,960 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,960 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,976 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,976 [root] DEBUG: Loader: Injecting process 7568 (thread 7564) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,976 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,976 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,976 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:05,976 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,976 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7568
2020-03-24 10:14:05,992 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7740
2020-03-24 10:14:05,992 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:05,992 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:05,992 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:05,992 [root] DEBUG: Loader: Injecting process 7740 (thread 7748) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,992 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:05,992 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,992 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:05,992 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:05,992 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7740
2020-03-24 10:14:06,006 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7740
2020-03-24 10:14:06,006 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,006 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,006 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,006 [root] DEBUG: Loader: Injecting process 7740 (thread 7748) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,023 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,023 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,023 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,023 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,023 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7740
2020-03-24 10:14:06,038 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7820
2020-03-24 10:14:06,038 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,038 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,038 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,038 [root] DEBUG: Loader: Injecting process 7820 (thread 7816) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,038 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,038 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,038 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,038 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,038 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7820
2020-03-24 10:14:06,053 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7820
2020-03-24 10:14:06,053 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,053 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,069 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,069 [root] DEBUG: Loader: Injecting process 7820 (thread 7816) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,069 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,069 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,069 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,069 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,069 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7820
2020-03-24 10:14:06,085 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7972
2020-03-24 10:14:06,085 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,085 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,085 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,085 [root] DEBUG: Loader: Injecting process 7972 (thread 7976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,085 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,085 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,085 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,085 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,085 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7972
2020-03-24 10:14:06,101 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7972
2020-03-24 10:14:06,101 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,101 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,101 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,115 [root] DEBUG: Loader: Injecting process 7972 (thread 7976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,115 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,115 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,115 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,115 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,115 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7972
2020-03-24 10:14:06,131 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8056
2020-03-24 10:14:06,131 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,131 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,131 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,131 [root] DEBUG: Loader: Injecting process 8056 (thread 8052) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,131 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,131 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,131 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,131 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,131 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8056
2020-03-24 10:14:06,148 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8056
2020-03-24 10:14:06,148 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,148 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,148 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,148 [root] DEBUG: Loader: Injecting process 8056 (thread 8052) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,148 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,148 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,148 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,148 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,163 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8056
2020-03-24 10:14:06,178 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8180
2020-03-24 10:14:06,178 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,178 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,194 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,194 [root] DEBUG: Loader: Injecting process 8180 (thread 6584) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,194 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,194 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,194 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,194 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,194 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8180
2020-03-24 10:14:06,210 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8180
2020-03-24 10:14:06,210 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,210 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,226 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,226 [root] DEBUG: Loader: Injecting process 8180 (thread 6584) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,226 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,226 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,226 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,226 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,226 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8180
2020-03-24 10:14:06,256 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7312
2020-03-24 10:14:06,256 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,256 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,256 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,256 [root] DEBUG: Loader: Injecting process 7312 (thread 7288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,256 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,256 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,256 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,256 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,256 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7312
2020-03-24 10:14:06,272 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7312
2020-03-24 10:14:06,272 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,272 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,272 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,272 [root] DEBUG: Loader: Injecting process 7312 (thread 7288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,272 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,272 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,272 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,272 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,288 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7312
2020-03-24 10:14:06,303 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7408
2020-03-24 10:14:06,303 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,303 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,303 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,303 [root] DEBUG: Loader: Injecting process 7408 (thread 7404) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,303 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,303 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,303 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,303 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,303 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7408
2020-03-24 10:14:06,319 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7408
2020-03-24 10:14:06,319 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,319 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,319 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,319 [root] DEBUG: Loader: Injecting process 7408 (thread 7404) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,319 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,319 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,319 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,319 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,319 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7408
2020-03-24 10:14:06,349 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7592
2020-03-24 10:14:06,349 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,349 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,349 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,349 [root] DEBUG: Loader: Injecting process 7592 (thread 7596) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,349 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,349 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,349 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,349 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,349 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7592
2020-03-24 10:14:06,365 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7592
2020-03-24 10:14:06,365 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,365 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,365 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,365 [root] DEBUG: Loader: Injecting process 7592 (thread 7596) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,365 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,365 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,365 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,365 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,381 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7592
2020-03-24 10:14:06,397 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7692
2020-03-24 10:14:06,397 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,397 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,397 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,397 [root] DEBUG: Loader: Injecting process 7692 (thread 7688) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,397 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,397 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,397 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,397 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,397 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7692
2020-03-24 10:14:06,413 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7692
2020-03-24 10:14:06,413 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,413 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,413 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,413 [root] DEBUG: Loader: Injecting process 7692 (thread 7688) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,427 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,427 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,427 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,427 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,427 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7692
2020-03-24 10:14:06,444 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7824
2020-03-24 10:14:06,444 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,444 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,444 [root] DEBUG: Loader: Injecting process 7824 (thread 7888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,444 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,444 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,444 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,444 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,444 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7824
2020-03-24 10:14:06,460 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7824
2020-03-24 10:14:06,460 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,460 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,474 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,474 [root] DEBUG: Loader: Injecting process 7824 (thread 7888) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,474 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,474 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,474 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,474 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,474 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7824
2020-03-24 10:14:06,490 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8024
2020-03-24 10:14:06,490 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,490 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,490 [root] DEBUG: Loader: Injecting process 8024 (thread 8028) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,490 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,490 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,490 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,490 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,490 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8024
2020-03-24 10:14:06,506 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8024
2020-03-24 10:14:06,506 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,506 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,522 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,522 [root] DEBUG: Loader: Injecting process 8024 (thread 8028) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,522 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,522 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,522 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,522 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,522 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8024
2020-03-24 10:14:06,538 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8116
2020-03-24 10:14:06,538 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,538 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,538 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,538 [root] DEBUG: Loader: Injecting process 8116 (thread 8084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,538 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,538 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,538 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,538 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,538 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8116
2020-03-24 10:14:06,552 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8116
2020-03-24 10:14:06,552 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,552 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,552 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,552 [root] DEBUG: Loader: Injecting process 8116 (thread 8084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,569 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,569 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,569 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,569 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,569 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8116
2020-03-24 10:14:06,584 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7188
2020-03-24 10:14:06,584 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,584 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,584 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,584 [root] DEBUG: Loader: Injecting process 7188 (thread 7268) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,584 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,584 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,584 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,584 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,584 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7188
2020-03-24 10:14:06,599 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7188
2020-03-24 10:14:06,599 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,599 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,599 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,599 [root] DEBUG: Loader: Injecting process 7188 (thread 7268) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,615 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,615 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,615 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,615 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,615 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7188
2020-03-24 10:14:06,631 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7336
2020-03-24 10:14:06,631 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,631 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,631 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,631 [root] DEBUG: Loader: Injecting process 7336 (thread 7276) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,631 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,631 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,631 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,631 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,631 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7336
2020-03-24 10:14:06,647 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7336
2020-03-24 10:14:06,647 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,647 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,647 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,647 [root] DEBUG: Loader: Injecting process 7336 (thread 7276) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,647 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,647 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,661 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,661 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,661 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7336
2020-03-24 10:14:06,677 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7588
2020-03-24 10:14:06,677 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,677 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,677 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,677 [root] DEBUG: Loader: Injecting process 7588 (thread 7632) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,677 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,677 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,677 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,677 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,677 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7588
2020-03-24 10:14:06,694 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7588
2020-03-24 10:14:06,694 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,694 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,694 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,694 [root] DEBUG: Loader: Injecting process 7588 (thread 7632) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,709 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,709 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,709 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,709 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,709 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7588
2020-03-24 10:14:06,724 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7768
2020-03-24 10:14:06,724 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,724 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,724 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,724 [root] DEBUG: Loader: Injecting process 7768 (thread 7772) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,724 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,724 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,724 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,724 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,724 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7768
2020-03-24 10:14:06,740 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7768
2020-03-24 10:14:06,740 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,740 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,756 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,756 [root] DEBUG: Loader: Injecting process 7768 (thread 7772) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,756 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,756 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,756 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,756 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,756 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7768
2020-03-24 10:14:06,772 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7892
2020-03-24 10:14:06,772 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,772 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,772 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,772 [root] DEBUG: Loader: Injecting process 7892 (thread 7856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,772 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,772 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,772 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,772 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,772 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7892
2020-03-24 10:14:06,786 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7892
2020-03-24 10:14:06,786 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,786 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,786 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,786 [root] DEBUG: Loader: Injecting process 7892 (thread 7856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,786 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,786 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,786 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,786 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,802 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7892
2020-03-24 10:14:06,818 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8132
2020-03-24 10:14:06,818 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,818 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,818 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,818 [root] DEBUG: Loader: Injecting process 8132 (thread 8136) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,818 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,818 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,818 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,818 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,818 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8132
2020-03-24 10:14:06,834 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8132
2020-03-24 10:14:06,834 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,834 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,834 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,834 [root] DEBUG: Loader: Injecting process 8132 (thread 8136) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,834 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,834 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,834 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,834 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,834 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8132
2020-03-24 10:14:06,865 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6444
2020-03-24 10:14:06,865 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,865 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,865 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,865 [root] DEBUG: Loader: Injecting process 6444 (thread 7176) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,865 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,865 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,865 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,865 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,865 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6444
2020-03-24 10:14:06,881 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 6444
2020-03-24 10:14:06,881 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,881 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,881 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,881 [root] DEBUG: Loader: Injecting process 6444 (thread 7176) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,895 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,895 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,895 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,895 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,895 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6444
2020-03-24 10:14:06,911 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7448
2020-03-24 10:14:06,911 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,911 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,911 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,911 [root] DEBUG: Loader: Injecting process 7448 (thread 7464) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,911 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,911 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,911 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,911 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,911 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7448
2020-03-24 10:14:06,927 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7448
2020-03-24 10:14:06,927 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,927 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,927 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,943 [root] DEBUG: Loader: Injecting process 7448 (thread 7464) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,959 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,959 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,959 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:06,959 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,959 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7448
2020-03-24 10:14:06,973 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7640
2020-03-24 10:14:06,973 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:06,973 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:06,973 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:06,973 [root] DEBUG: Loader: Injecting process 7640 (thread 7696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,973 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:06,973 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,973 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:06,973 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:06,973 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7640
2020-03-24 10:14:06,990 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7640
2020-03-24 10:14:07,006 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,006 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,006 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,006 [root] DEBUG: Loader: Injecting process 7640 (thread 7696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,006 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,006 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,006 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,006 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,006 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7640
2020-03-24 10:14:07,020 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7680
2020-03-24 10:14:07,020 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,020 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,020 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,020 [root] DEBUG: Loader: Injecting process 7680 (thread 7840) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,020 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,020 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,020 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,020 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,020 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7680
2020-03-24 10:14:07,036 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7680
2020-03-24 10:14:07,036 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,036 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,052 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,052 [root] DEBUG: Loader: Injecting process 7680 (thread 7840) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,052 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,052 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,052 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,052 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,052 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7680
2020-03-24 10:14:07,068 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8012
2020-03-24 10:14:07,068 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,068 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,068 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,068 [root] DEBUG: Loader: Injecting process 8012 (thread 7956) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,068 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,068 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,068 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,068 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,068 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8012
2020-03-24 10:14:07,084 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8012
2020-03-24 10:14:07,084 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,084 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,098 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,098 [root] DEBUG: Loader: Injecting process 8012 (thread 7956) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,098 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,098 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,098 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,098 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,098 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8012
2020-03-24 10:14:07,115 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7208
2020-03-24 10:14:07,115 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,115 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,115 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,115 [root] DEBUG: Loader: Injecting process 7208 (thread 8152) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,115 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,115 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,115 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,115 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,115 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7208
2020-03-24 10:14:07,130 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7208
2020-03-24 10:14:07,130 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,130 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,130 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,145 [root] DEBUG: Loader: Injecting process 7208 (thread 8152) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,145 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,145 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,145 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,145 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,145 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7208
2020-03-24 10:14:07,161 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7184
2020-03-24 10:14:07,161 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,161 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,161 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,161 [root] DEBUG: Loader: Injecting process 7184 (thread 7340) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,161 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,161 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,161 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,161 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,161 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-03-24 10:14:07,177 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7184
2020-03-24 10:14:07,177 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,177 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,193 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,193 [root] DEBUG: Loader: Injecting process 7184 (thread 7340) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,193 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,193 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,193 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,193 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,193 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-03-24 10:14:07,207 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7788
2020-03-24 10:14:07,207 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,207 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,207 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,207 [root] DEBUG: Loader: Injecting process 7788 (thread 7660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,207 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,207 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,207 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,207 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,207 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-03-24 10:14:07,223 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7788
2020-03-24 10:14:07,223 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,223 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,240 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,240 [root] DEBUG: Loader: Injecting process 7788 (thread 7660) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,240 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,240 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,240 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,240 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,240 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-03-24 10:14:07,255 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7828
2020-03-24 10:14:07,255 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,255 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,255 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,255 [root] DEBUG: Loader: Injecting process 7828 (thread 7940) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,255 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,255 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,255 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,255 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,255 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7828
2020-03-24 10:14:07,270 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7828
2020-03-24 10:14:07,270 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,270 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,286 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,286 [root] DEBUG: Loader: Injecting process 7828 (thread 7940) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,286 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,286 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,286 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,286 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,286 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7828
2020-03-24 10:14:07,302 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8080
2020-03-24 10:14:07,302 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,302 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,302 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,302 [root] DEBUG: Loader: Injecting process 8080 (thread 8148) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,302 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,302 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,302 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,302 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,302 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8080
2020-03-24 10:14:07,318 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8080
2020-03-24 10:14:07,318 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,318 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,332 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,332 [root] DEBUG: Loader: Injecting process 8080 (thread 8148) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,332 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,332 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,332 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,332 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,332 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8080
2020-03-24 10:14:07,348 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7376
2020-03-24 10:14:07,348 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,348 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,348 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,348 [root] DEBUG: Loader: Injecting process 7376 (thread 7412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,348 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,348 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,348 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,348 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,364 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7376
2020-03-24 10:14:07,380 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7376
2020-03-24 10:14:07,380 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,380 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,380 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,380 [root] DEBUG: Loader: Injecting process 7376 (thread 7412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,380 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,380 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,380 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,380 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,380 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7376
2020-03-24 10:14:07,395 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7432
2020-03-24 10:14:07,395 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,395 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,395 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,395 [root] DEBUG: Loader: Injecting process 7432 (thread 7624) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,395 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,395 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,395 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,395 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,395 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-03-24 10:14:07,411 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7432
2020-03-24 10:14:07,411 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,411 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,411 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,411 [root] DEBUG: Loader: Injecting process 7432 (thread 7624) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,411 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,427 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,427 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,427 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,427 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-03-24 10:14:07,441 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7936
2020-03-24 10:14:07,441 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,441 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,441 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,441 [root] DEBUG: Loader: Injecting process 7936 (thread 7964) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,441 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,441 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,441 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,441 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,441 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7936
2020-03-24 10:14:07,457 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7936
2020-03-24 10:14:07,457 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,457 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,457 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,457 [root] DEBUG: Loader: Injecting process 7936 (thread 7964) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,473 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,473 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,473 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,473 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,473 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7936
2020-03-24 10:14:07,489 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8016
2020-03-24 10:14:07,489 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,489 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,489 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,489 [root] DEBUG: Loader: Injecting process 8016 (thread 7252) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,489 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,489 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,489 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,489 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,489 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8016
2020-03-24 10:14:07,505 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8016
2020-03-24 10:14:07,505 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,505 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,519 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,519 [root] DEBUG: Loader: Injecting process 8016 (thread 7252) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,519 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,519 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,519 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,519 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,519 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8016
2020-03-24 10:14:07,536 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7552
2020-03-24 10:14:07,536 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,536 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,536 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,536 [root] DEBUG: Loader: Injecting process 7552 (thread 7580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,536 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,536 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,536 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,536 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,552 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7552
2020-03-24 10:14:07,552 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7552
2020-03-24 10:14:07,552 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,552 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,566 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,566 [root] DEBUG: Loader: Injecting process 7552 (thread 7580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,566 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,566 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,566 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,566 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,566 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7552
2020-03-24 10:14:07,582 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7948
2020-03-24 10:14:07,582 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,582 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,582 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,582 [root] DEBUG: Loader: Injecting process 7948 (thread 7832) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,582 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,582 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,582 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,598 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,598 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7948
2020-03-24 10:14:07,614 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7948
2020-03-24 10:14:07,614 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,614 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,614 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,614 [root] DEBUG: Loader: Injecting process 7948 (thread 7832) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,614 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,614 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,614 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,614 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,614 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7948
2020-03-24 10:14:07,630 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8128
2020-03-24 10:14:07,630 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,630 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,630 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,630 [root] DEBUG: Loader: Injecting process 8128 (thread 7344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,630 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,630 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,630 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,630 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,630 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8128
2020-03-24 10:14:07,644 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8128
2020-03-24 10:14:07,644 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,644 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,661 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,661 [root] DEBUG: Loader: Injecting process 8128 (thread 7344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,661 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,661 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,661 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,661 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,661 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8128
2020-03-24 10:14:07,676 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7496
2020-03-24 10:14:07,676 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,676 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,676 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,691 [root] DEBUG: Loader: Injecting process 7496 (thread 7540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,691 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,691 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,691 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,691 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,691 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7496
2020-03-24 10:14:07,707 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7496
2020-03-24 10:14:07,707 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,707 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,707 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,707 [root] DEBUG: Loader: Injecting process 7496 (thread 7540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,723 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,723 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,723 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,723 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,723 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7496
2020-03-24 10:14:07,739 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7920
2020-03-24 10:14:07,739 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,739 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,739 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,739 [root] DEBUG: Loader: Injecting process 7920 (thread 8164) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,739 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,739 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,739 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,739 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,739 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7920
2020-03-24 10:14:07,753 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7920
2020-03-24 10:14:07,753 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,753 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,769 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,769 [root] DEBUG: Loader: Injecting process 7920 (thread 8164) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,769 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,769 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,769 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,769 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,769 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7920
2020-03-24 10:14:07,786 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7492
2020-03-24 10:14:07,786 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,786 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,786 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,786 [root] DEBUG: Loader: Injecting process 7492 (thread 7296) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,801 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,801 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,801 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,801 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,801 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7492
2020-03-24 10:14:07,816 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7492
2020-03-24 10:14:07,816 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,816 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,816 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,816 [root] DEBUG: Loader: Injecting process 7492 (thread 7296) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,816 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,816 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,816 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,816 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,832 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7492
2020-03-24 10:14:07,848 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8172
2020-03-24 10:14:07,848 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,848 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,848 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,848 [root] DEBUG: Loader: Injecting process 8172 (thread 8068) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,864 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,864 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,864 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,864 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,864 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8172
2020-03-24 10:14:07,878 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8172
2020-03-24 10:14:07,878 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,878 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,878 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,878 [root] DEBUG: Loader: Injecting process 8172 (thread 8068) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,878 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,878 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,878 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,878 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,878 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8172
2020-03-24 10:14:07,910 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7192
2020-03-24 10:14:07,910 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,910 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,910 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,910 [root] DEBUG: Loader: Injecting process 7192 (thread 8060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,910 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,910 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,910 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,910 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,910 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7192
2020-03-24 10:14:07,926 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7192
2020-03-24 10:14:07,926 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,926 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,941 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,941 [root] DEBUG: Loader: Injecting process 7192 (thread 8060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,941 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,941 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,941 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,941 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,941 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7192
2020-03-24 10:14:07,957 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8124
2020-03-24 10:14:07,957 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,957 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,957 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,957 [root] DEBUG: Loader: Injecting process 8124 (thread 8072) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,957 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,957 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,957 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:07,957 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,957 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8124
2020-03-24 10:14:07,987 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8124
2020-03-24 10:14:07,987 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:07,987 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:07,987 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:07,987 [root] DEBUG: Loader: Injecting process 8124 (thread 8072) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,987 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:07,987 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,987 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:07,987 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:07,987 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8124
2020-03-24 10:14:08,003 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1512
2020-03-24 10:14:08,003 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,003 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,003 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,003 [root] DEBUG: Loader: Injecting process 1512 (thread 7548) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,003 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,003 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,003 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,003 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,003 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1512
2020-03-24 10:14:08,019 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1512
2020-03-24 10:14:08,019 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,019 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,035 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,035 [root] DEBUG: Loader: Injecting process 1512 (thread 7548) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,035 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,035 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,035 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,035 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,035 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1512
2020-03-24 10:14:08,051 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8040
2020-03-24 10:14:08,051 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,051 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,051 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,051 [root] DEBUG: Loader: Injecting process 8040 (thread 7204) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,051 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,051 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,051 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,051 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,051 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8040
2020-03-24 10:14:08,065 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8040
2020-03-24 10:14:08,065 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,065 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,065 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,065 [root] DEBUG: Loader: Injecting process 8040 (thread 7204) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,065 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,082 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,082 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,082 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,082 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8040
2020-03-24 10:14:08,098 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7488
2020-03-24 10:14:08,098 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,098 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,098 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,098 [root] DEBUG: Loader: Injecting process 7488 (thread 7460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,098 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,098 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,098 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,098 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,098 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7488
2020-03-24 10:14:08,112 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7488
2020-03-24 10:14:08,112 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,112 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,128 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,128 [root] DEBUG: Loader: Injecting process 7488 (thread 7460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,128 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,128 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,128 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,128 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,128 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7488
2020-03-24 10:14:08,144 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7668
2020-03-24 10:14:08,144 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,144 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,144 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,144 [root] DEBUG: Loader: Injecting process 7668 (thread 7664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,144 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,144 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,160 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,160 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,160 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7668
2020-03-24 10:14:08,176 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7668
2020-03-24 10:14:08,176 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,176 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,176 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,176 [root] DEBUG: Loader: Injecting process 7668 (thread 7664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,176 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,176 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,176 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,176 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,176 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7668
2020-03-24 10:14:08,207 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7260
2020-03-24 10:14:08,207 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,207 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,207 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,207 [root] DEBUG: Loader: Injecting process 7260 (thread 7356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,207 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,207 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,207 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,221 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,221 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7260
2020-03-24 10:14:08,237 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7260
2020-03-24 10:14:08,237 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,237 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,237 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,237 [root] DEBUG: Loader: Injecting process 7260 (thread 7356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,237 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,237 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,237 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,253 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,253 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7260
2020-03-24 10:14:08,269 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7560
2020-03-24 10:14:08,269 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,269 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,285 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,285 [root] DEBUG: Loader: Injecting process 7560 (thread 7384) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,285 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,285 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,285 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,285 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,285 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7560
2020-03-24 10:14:08,299 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7560
2020-03-24 10:14:08,299 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,299 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,299 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,299 [root] DEBUG: Loader: Injecting process 7560 (thread 7384) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,299 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,299 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,299 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,299 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,315 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7560
2020-03-24 10:14:08,332 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7544
2020-03-24 10:14:08,332 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,332 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,332 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,332 [root] DEBUG: Loader: Injecting process 7544 (thread 8120) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,332 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,332 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,332 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,332 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,332 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7544
2020-03-24 10:14:08,346 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7544
2020-03-24 10:14:08,346 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,346 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,362 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,362 [root] DEBUG: Loader: Injecting process 7544 (thread 8120) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,362 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,362 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,362 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,362 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,362 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7544
2020-03-24 10:14:08,378 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7756
2020-03-24 10:14:08,378 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,378 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,378 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,378 [root] DEBUG: Loader: Injecting process 7756 (thread 7368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,378 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,378 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,378 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,378 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,378 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7756
2020-03-24 10:14:08,394 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 7756
2020-03-24 10:14:08,394 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,394 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,410 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,410 [root] DEBUG: Loader: Injecting process 7756 (thread 7368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,410 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,410 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,410 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,410 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,410 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7756
2020-03-24 10:14:08,424 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8244
2020-03-24 10:14:08,424 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,424 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,424 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,424 [root] DEBUG: Loader: Injecting process 8244 (thread 8248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,424 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,424 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,424 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,424 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,424 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8244
2020-03-24 10:14:08,440 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8244
2020-03-24 10:14:08,440 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,440 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,456 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,456 [root] DEBUG: Loader: Injecting process 8244 (thread 8248) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,456 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,456 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,456 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,456 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,456 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8244
2020-03-24 10:14:08,471 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8340
2020-03-24 10:14:08,471 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,471 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,471 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,471 [root] DEBUG: Loader: Injecting process 8340 (thread 8344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,471 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,471 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,471 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,471 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,471 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8340
2020-03-24 10:14:08,487 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8340
2020-03-24 10:14:08,487 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,487 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,503 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,503 [root] DEBUG: Loader: Injecting process 8340 (thread 8344) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,503 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,503 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,503 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,503 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,503 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8340
2020-03-24 10:14:08,519 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8436
2020-03-24 10:14:08,519 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,519 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,519 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,519 [root] DEBUG: Loader: Injecting process 8436 (thread 8440) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,519 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,519 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,533 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,533 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,533 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8436
2020-03-24 10:14:08,533 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8436
2020-03-24 10:14:08,533 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,533 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,549 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,549 [root] DEBUG: Loader: Injecting process 8436 (thread 8440) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,549 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,549 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,549 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,549 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,549 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8436
2020-03-24 10:14:08,565 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8532
2020-03-24 10:14:08,565 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,565 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,565 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,565 [root] DEBUG: Loader: Injecting process 8532 (thread 8536) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,565 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,565 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,565 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,565 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,565 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8532
2020-03-24 10:14:08,581 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8532
2020-03-24 10:14:08,581 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,581 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,596 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,596 [root] DEBUG: Loader: Injecting process 8532 (thread 8536) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,596 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,596 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,596 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,596 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,596 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8532
2020-03-24 10:14:08,611 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8628
2020-03-24 10:14:08,611 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,611 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,611 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,611 [root] DEBUG: Loader: Injecting process 8628 (thread 8632) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,611 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,611 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,611 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,611 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8628
2020-03-24 10:14:08,628 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8628
2020-03-24 10:14:08,628 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,628 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,644 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,644 [root] DEBUG: Loader: Injecting process 8628 (thread 8632) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,644 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,644 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,644 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,644 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,644 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8628
2020-03-24 10:14:08,658 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8724
2020-03-24 10:14:08,658 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,658 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,658 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,658 [root] DEBUG: Loader: Injecting process 8724 (thread 8728) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,658 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,658 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,658 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,658 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,658 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8724
2020-03-24 10:14:08,674 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8724
2020-03-24 10:14:08,674 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,674 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,674 [root] DEBUG: Loader: Injecting process 8724 (thread 8728) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,690 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,690 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,690 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,690 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,690 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8724
2020-03-24 10:14:08,706 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8820
2020-03-24 10:14:08,706 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,706 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,706 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,706 [root] DEBUG: Loader: Injecting process 8820 (thread 8824) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,706 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,706 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,706 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,706 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,706 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8820
2020-03-24 10:14:08,721 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8820
2020-03-24 10:14:08,721 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,721 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,721 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,721 [root] DEBUG: Loader: Injecting process 8820 (thread 8824) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,736 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,736 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,736 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,736 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,736 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8820
2020-03-24 10:14:08,753 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8916
2020-03-24 10:14:08,753 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,753 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,753 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,753 [root] DEBUG: Loader: Injecting process 8916 (thread 8920) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,753 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,753 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,753 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,753 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,753 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8916
2020-03-24 10:14:08,767 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8916
2020-03-24 10:14:08,767 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,767 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,783 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,783 [root] DEBUG: Loader: Injecting process 8916 (thread 8920) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,783 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,783 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,783 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,783 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,783 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8916
2020-03-24 10:14:08,799 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9012
2020-03-24 10:14:08,799 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,799 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,799 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,799 [root] DEBUG: Loader: Injecting process 9012 (thread 9016) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,799 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,799 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,799 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,799 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,799 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9012
2020-03-24 10:14:08,815 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9012
2020-03-24 10:14:08,815 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,815 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,815 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,815 [root] DEBUG: Loader: Injecting process 9012 (thread 9016) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,815 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,815 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,831 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,831 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,831 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9012
2020-03-24 10:14:08,845 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9108
2020-03-24 10:14:08,845 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,845 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,845 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,845 [root] DEBUG: Loader: Injecting process 9108 (thread 9112) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,845 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,845 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,845 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,845 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9108
2020-03-24 10:14:08,861 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9108
2020-03-24 10:14:08,861 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,861 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,878 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,878 [root] DEBUG: Loader: Injecting process 9108 (thread 9112) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,878 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,878 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,878 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,878 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,878 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9108
2020-03-24 10:14:08,892 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9204
2020-03-24 10:14:08,892 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,892 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,892 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,892 [root] DEBUG: Loader: Injecting process 9204 (thread 9208) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,892 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,892 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,892 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,892 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,892 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9204
2020-03-24 10:14:08,908 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9204
2020-03-24 10:14:08,908 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,908 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,908 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,924 [root] DEBUG: Loader: Injecting process 9204 (thread 9208) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,924 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,924 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,924 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,924 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,924 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9204
2020-03-24 10:14:08,940 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8292
2020-03-24 10:14:08,940 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,940 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,940 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,940 [root] DEBUG: Loader: Injecting process 8292 (thread 8268) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,940 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,940 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,940 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,940 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,956 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8292
2020-03-24 10:14:08,956 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8292
2020-03-24 10:14:08,956 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,956 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,970 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,970 [root] DEBUG: Loader: Injecting process 8292 (thread 8268) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,970 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,970 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,970 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:08,970 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,970 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8292
2020-03-24 10:14:08,986 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8408
2020-03-24 10:14:08,986 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:08,986 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:08,986 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:08,986 [root] DEBUG: Loader: Injecting process 8408 (thread 8412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,986 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:08,986 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,986 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:08,986 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:08,986 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8408
2020-03-24 10:14:09,002 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8408
2020-03-24 10:14:09,002 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,002 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,017 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,017 [root] DEBUG: Loader: Injecting process 8408 (thread 8412) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,017 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,017 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,017 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,017 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,017 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8408
2020-03-24 10:14:09,033 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8520
2020-03-24 10:14:09,033 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,033 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,033 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,033 [root] DEBUG: Loader: Injecting process 8520 (thread 8524) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,033 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,033 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,033 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,033 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,033 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8520
2020-03-24 10:14:09,049 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8520
2020-03-24 10:14:09,049 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,049 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,065 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,065 [root] DEBUG: Loader: Injecting process 8520 (thread 8524) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,065 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,065 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,065 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,065 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,065 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8520
2020-03-24 10:14:09,079 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8588
2020-03-24 10:14:09,079 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,079 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,079 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,079 [root] DEBUG: Loader: Injecting process 8588 (thread 8584) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,079 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,079 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,079 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,079 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,095 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8588
2020-03-24 10:14:09,111 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8588
2020-03-24 10:14:09,111 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,111 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,111 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,111 [root] DEBUG: Loader: Injecting process 8588 (thread 8584) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,111 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,111 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,111 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,127 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,127 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8588
2020-03-24 10:14:09,142 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8756
2020-03-24 10:14:09,142 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,142 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,142 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,142 [root] DEBUG: Loader: Injecting process 8756 (thread 8760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,142 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,142 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,142 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,142 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,142 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8756
2020-03-24 10:14:09,157 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8756
2020-03-24 10:14:09,157 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,157 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,157 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,157 [root] DEBUG: Loader: Injecting process 8756 (thread 8760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,174 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,174 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,174 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,174 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,174 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8756
2020-03-24 10:14:09,190 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8868
2020-03-24 10:14:09,190 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,190 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,190 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,190 [root] DEBUG: Loader: Injecting process 8868 (thread 8844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,190 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,190 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,190 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,190 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,190 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8868
2020-03-24 10:14:09,204 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8868
2020-03-24 10:14:09,204 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,204 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,220 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,220 [root] DEBUG: Loader: Injecting process 8868 (thread 8844) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,220 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,220 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,220 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,220 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,220 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8868
2020-03-24 10:14:09,236 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8984
2020-03-24 10:14:09,236 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,236 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,236 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,236 [root] DEBUG: Loader: Injecting process 8984 (thread 8988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,236 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,236 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,236 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,236 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,236 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8984
2020-03-24 10:14:09,252 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8984
2020-03-24 10:14:09,252 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,252 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,267 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,267 [root] DEBUG: Loader: Injecting process 8984 (thread 8988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,267 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,267 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,267 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,267 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,267 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8984
2020-03-24 10:14:09,282 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9096
2020-03-24 10:14:09,282 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,282 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,282 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,299 [root] DEBUG: Loader: Injecting process 9096 (thread 9100) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,299 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,299 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,299 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,299 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,299 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9096
2020-03-24 10:14:09,313 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9096
2020-03-24 10:14:09,313 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,313 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,313 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,313 [root] DEBUG: Loader: Injecting process 9096 (thread 9100) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,313 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,329 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,329 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,329 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,329 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9096
2020-03-24 10:14:09,345 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9160
2020-03-24 10:14:09,345 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,345 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,345 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,345 [root] DEBUG: Loader: Injecting process 9160 (thread 9200) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,345 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,345 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,345 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,345 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,345 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9160
2020-03-24 10:14:09,361 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9160
2020-03-24 10:14:09,361 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,361 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,361 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,377 [root] DEBUG: Loader: Injecting process 9160 (thread 9200) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,377 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,377 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,377 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,377 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,377 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9160
2020-03-24 10:14:09,391 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8388
2020-03-24 10:14:09,391 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,391 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,391 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,391 [root] DEBUG: Loader: Injecting process 8388 (thread 8364) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,391 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,391 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,391 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,391 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,407 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8388
2020-03-24 10:14:09,407 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8388
2020-03-24 10:14:09,407 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,407 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,424 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,424 [root] DEBUG: Loader: Injecting process 8388 (thread 8364) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,424 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,424 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,424 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,424 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,424 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8388
2020-03-24 10:14:09,438 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8476
2020-03-24 10:14:09,438 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,438 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,438 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,438 [root] DEBUG: Loader: Injecting process 8476 (thread 8468) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,438 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,438 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,438 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,438 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,438 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8476
2020-03-24 10:14:09,454 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8476
2020-03-24 10:14:09,454 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,454 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,470 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,470 [root] DEBUG: Loader: Injecting process 8476 (thread 8468) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,470 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,470 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,470 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,470 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,470 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8476
2020-03-24 10:14:09,486 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8676
2020-03-24 10:14:09,486 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,486 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,486 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,486 [root] DEBUG: Loader: Injecting process 8676 (thread 8652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,486 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,486 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,486 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,486 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,486 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8676
2020-03-24 10:14:09,502 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8676
2020-03-24 10:14:09,502 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,502 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,516 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,516 [root] DEBUG: Loader: Injecting process 8676 (thread 8652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,516 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,516 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,516 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,516 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,516 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8676
2020-03-24 10:14:09,532 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8808
2020-03-24 10:14:09,532 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,532 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,532 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,532 [root] DEBUG: Loader: Injecting process 8808 (thread 8748) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,532 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,532 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,532 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,532 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,532 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8808
2020-03-24 10:14:09,548 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8808
2020-03-24 10:14:09,548 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,548 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,563 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,563 [root] DEBUG: Loader: Injecting process 8808 (thread 8748) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,563 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,563 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,563 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,563 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,563 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8808
2020-03-24 10:14:09,579 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8956
2020-03-24 10:14:09,579 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,579 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,579 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,579 [root] DEBUG: Loader: Injecting process 8956 (thread 8960) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,579 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,579 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,579 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,579 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,579 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8956
2020-03-24 10:14:09,595 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8956
2020-03-24 10:14:09,595 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,595 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,595 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,595 [root] DEBUG: Loader: Injecting process 8956 (thread 8960) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,595 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,595 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,611 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,611 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8956
2020-03-24 10:14:09,625 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9088
2020-03-24 10:14:09,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,625 [root] DEBUG: Loader: Injecting process 9088 (thread 9060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,625 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,625 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9088
2020-03-24 10:14:09,641 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9088
2020-03-24 10:14:09,641 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,641 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,657 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,657 [root] DEBUG: Loader: Injecting process 9088 (thread 9060) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,657 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,657 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,657 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,657 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,657 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9088
2020-03-24 10:14:09,673 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9128
2020-03-24 10:14:09,673 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,673 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,673 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,673 [root] DEBUG: Loader: Injecting process 9128 (thread 9164) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,673 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,673 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,673 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,673 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,673 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9128
2020-03-24 10:14:09,688 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9128
2020-03-24 10:14:09,688 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,688 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,688 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,688 [root] DEBUG: Loader: Injecting process 9128 (thread 9164) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,688 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,703 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9128
2020-03-24 10:14:09,720 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8432
2020-03-24 10:14:09,720 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,720 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,720 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,720 [root] DEBUG: Loader: Injecting process 8432 (thread 8392) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,720 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,720 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,720 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,720 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8432
2020-03-24 10:14:09,736 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8432
2020-03-24 10:14:09,736 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,736 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,750 [root] DEBUG: Loader: Injecting process 8432 (thread 8392) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,750 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,750 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8432
2020-03-24 10:14:09,766 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8572
2020-03-24 10:14:09,766 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,766 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,766 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,766 [root] DEBUG: Loader: Injecting process 8572 (thread 8568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,766 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,766 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,766 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,766 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,766 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8572
2020-03-24 10:14:09,782 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8572
2020-03-24 10:14:09,782 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,782 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,782 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,782 [root] DEBUG: Loader: Injecting process 8572 (thread 8568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,782 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,798 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,798 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,798 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,798 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8572
2020-03-24 10:14:09,813 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8752
2020-03-24 10:14:09,813 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,813 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,813 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,813 [root] DEBUG: Loader: Injecting process 8752 (thread 8740) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,813 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,813 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,813 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,813 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,813 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8752
2020-03-24 10:14:09,828 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8752
2020-03-24 10:14:09,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,828 [root] DEBUG: Loader: Injecting process 8752 (thread 8740) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,845 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,845 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,845 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,845 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8752
2020-03-24 10:14:09,859 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8888
2020-03-24 10:14:09,859 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,859 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,859 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,859 [root] DEBUG: Loader: Injecting process 8888 (thread 8908) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,859 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,859 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,859 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,859 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,859 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8888
2020-03-24 10:14:09,875 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8888
2020-03-24 10:14:09,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,875 [root] DEBUG: Loader: Injecting process 8888 (thread 8908) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,875 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,891 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,891 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,891 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8888
2020-03-24 10:14:09,907 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9008
2020-03-24 10:14:09,907 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,907 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,907 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,907 [root] DEBUG: Loader: Injecting process 9008 (thread 9084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,907 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,907 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,907 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,907 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,907 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9008
2020-03-24 10:14:09,923 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9008
2020-03-24 10:14:09,923 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,923 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,923 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,923 [root] DEBUG: Loader: Injecting process 9008 (thread 9084) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,923 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,937 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9008
2020-03-24 10:14:09,953 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8224
2020-03-24 10:14:09,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,953 [root] DEBUG: Loader: Injecting process 8224 (thread 8316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,953 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:09,953 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8224
2020-03-24 10:14:09,970 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8224
2020-03-24 10:14:09,970 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:09,970 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:09,970 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:09,970 [root] DEBUG: Loader: Injecting process 8224 (thread 8316) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,970 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:09,970 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,984 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:09,984 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:09,984 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8224
2020-03-24 10:14:10,000 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8336
2020-03-24 10:14:10,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,000 [root] DEBUG: Loader: Injecting process 8336 (thread 8356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,000 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,000 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8336
2020-03-24 10:14:10,016 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8336
2020-03-24 10:14:10,016 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,016 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,016 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,016 [root] DEBUG: Loader: Injecting process 8336 (thread 8356) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,016 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,016 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,016 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,016 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,032 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8336
2020-03-24 10:14:10,062 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8684
2020-03-24 10:14:10,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,062 [root] DEBUG: Loader: Injecting process 8684 (thread 8680) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,062 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,062 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8684
2020-03-24 10:14:10,078 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8684
2020-03-24 10:14:10,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,094 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,094 [root] DEBUG: Loader: Injecting process 8684 (thread 8680) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,094 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,094 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,094 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,094 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,094 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8684
2020-03-24 10:14:10,109 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8896
2020-03-24 10:14:10,109 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,109 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,109 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,109 [root] DEBUG: Loader: Injecting process 8896 (thread 8852) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,109 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,109 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,109 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,109 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,109 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8896
2020-03-24 10:14:10,125 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8896
2020-03-24 10:14:10,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,125 [root] DEBUG: Loader: Injecting process 8896 (thread 8852) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,125 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,141 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,141 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,141 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8896
2020-03-24 10:14:10,157 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8948
2020-03-24 10:14:10,157 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,157 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,157 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,157 [root] DEBUG: Loader: Injecting process 8948 (thread 9040) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,157 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,157 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,157 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,157 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,157 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8948
2020-03-24 10:14:10,171 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8948
2020-03-24 10:14:10,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,187 [root] DEBUG: Loader: Injecting process 8948 (thread 9040) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,187 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,187 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8948
2020-03-24 10:14:10,203 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8208
2020-03-24 10:14:10,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,203 [root] DEBUG: Loader: Injecting process 8208 (thread 8384) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,203 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,203 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8208
2020-03-24 10:14:10,219 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8208
2020-03-24 10:14:10,219 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,219 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,219 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,234 [root] DEBUG: Loader: Injecting process 8208 (thread 8384) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,234 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,234 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,234 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,234 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,234 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8208
2020-03-24 10:14:10,250 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8528
2020-03-24 10:14:10,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,250 [root] DEBUG: Loader: Injecting process 8528 (thread 8580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,250 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,250 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8528
2020-03-24 10:14:10,266 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8528
2020-03-24 10:14:10,266 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,266 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,282 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,282 [root] DEBUG: Loader: Injecting process 8528 (thread 8580) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,282 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,282 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,282 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,282 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,282 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8528
2020-03-24 10:14:10,296 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8800
2020-03-24 10:14:10,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,296 [root] DEBUG: Loader: Injecting process 8800 (thread 8848) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,296 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,296 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8800
2020-03-24 10:14:10,312 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8800
2020-03-24 10:14:10,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,328 [root] DEBUG: Loader: Injecting process 8800 (thread 8848) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,328 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,328 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8800
2020-03-24 10:14:10,344 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9004
2020-03-24 10:14:10,344 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,344 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,344 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,344 [root] DEBUG: Loader: Injecting process 9004 (thread 9032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,344 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,344 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,359 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,359 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,359 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9004
2020-03-24 10:14:10,375 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9004
2020-03-24 10:14:10,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,375 [root] DEBUG: Loader: Injecting process 9004 (thread 9032) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,375 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,375 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,391 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9004
2020-03-24 10:14:10,405 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8240
2020-03-24 10:14:10,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,405 [root] DEBUG: Loader: Injecting process 8240 (thread 8288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,405 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,405 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8240
2020-03-24 10:14:10,421 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8240
2020-03-24 10:14:10,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,437 [root] DEBUG: Loader: Injecting process 8240 (thread 8288) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,437 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,437 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8240
2020-03-24 10:14:10,453 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8616
2020-03-24 10:14:10,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,453 [root] DEBUG: Loader: Injecting process 8616 (thread 8592) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,469 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,469 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,469 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,469 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,469 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8616
2020-03-24 10:14:10,469 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8616
2020-03-24 10:14:10,469 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,483 [root] DEBUG: Loader: Injecting process 8616 (thread 8592) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,483 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,483 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8616
2020-03-24 10:14:10,500 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8856
2020-03-24 10:14:10,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,500 [root] DEBUG: Loader: Injecting process 8856 (thread 8708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,500 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,500 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8856
2020-03-24 10:14:10,516 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8856
2020-03-24 10:14:10,516 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,516 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,530 [root] DEBUG: Loader: Injecting process 8856 (thread 8708) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,530 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,530 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8856
2020-03-24 10:14:10,546 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8228
2020-03-24 10:14:10,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,546 [root] DEBUG: Loader: Injecting process 8228 (thread 9172) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,546 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,562 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8228
2020-03-24 10:14:10,578 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8228
2020-03-24 10:14:10,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,578 [root] DEBUG: Loader: Injecting process 8228 (thread 9172) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,578 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,578 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8228
2020-03-24 10:14:10,608 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8548
2020-03-24 10:14:10,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,608 [root] DEBUG: Loader: Injecting process 8548 (thread 8428) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,608 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,625 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8548
2020-03-24 10:14:10,640 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8548
2020-03-24 10:14:10,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,640 [root] DEBUG: Loader: Injecting process 8548 (thread 8428) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,640 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,640 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8548
2020-03-24 10:14:10,671 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8700
2020-03-24 10:14:10,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,671 [root] DEBUG: Loader: Injecting process 8700 (thread 8972) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,671 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,671 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8700
2020-03-24 10:14:10,687 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8700
2020-03-24 10:14:10,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,703 [root] DEBUG: Loader: Injecting process 8700 (thread 8972) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,703 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,703 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8700
2020-03-24 10:14:10,717 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9124
2020-03-24 10:14:10,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,717 [root] DEBUG: Loader: Injecting process 9124 (thread 8512) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,717 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,717 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9124
2020-03-24 10:14:10,733 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9124
2020-03-24 10:14:10,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,750 [root] DEBUG: Loader: Injecting process 9124 (thread 8512) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,750 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,750 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9124
2020-03-24 10:14:10,765 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8712
2020-03-24 10:14:10,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,765 [root] DEBUG: Loader: Injecting process 8712 (thread 8600) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,765 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,765 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8712
2020-03-24 10:14:10,780 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8712
2020-03-24 10:14:10,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,796 [root] DEBUG: Loader: Injecting process 8712 (thread 8600) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,796 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,796 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8712
2020-03-24 10:14:10,812 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9152
2020-03-24 10:14:10,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,812 [root] DEBUG: Loader: Injecting process 9152 (thread 9148) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,812 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,812 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9152
2020-03-24 10:14:10,828 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9152
2020-03-24 10:14:10,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,842 [root] DEBUG: Loader: Injecting process 9152 (thread 9148) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,842 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,842 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9152
2020-03-24 10:14:10,858 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8608
2020-03-24 10:14:10,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,858 [root] DEBUG: Loader: Injecting process 8608 (thread 8232) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,858 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,858 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8608
2020-03-24 10:14:10,874 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8608
2020-03-24 10:14:10,874 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,874 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,890 [root] DEBUG: Loader: Injecting process 8608 (thread 8232) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,890 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,890 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8608
2020-03-24 10:14:10,905 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8672
2020-03-24 10:14:10,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,905 [root] DEBUG: Loader: Injecting process 8672 (thread 9156) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,905 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,905 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8672
2020-03-24 10:14:10,921 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8672
2020-03-24 10:14:10,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,937 [root] DEBUG: Loader: Injecting process 8672 (thread 9156) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,937 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,937 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8672
2020-03-24 10:14:10,951 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8704
2020-03-24 10:14:10,951 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,951 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,951 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,951 [root] DEBUG: Loader: Injecting process 8704 (thread 8696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,951 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,951 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,951 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:10,951 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,951 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8704
2020-03-24 10:14:10,967 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8704
2020-03-24 10:14:10,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:10,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:10,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:10,983 [root] DEBUG: Loader: Injecting process 8704 (thread 8696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,983 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:10,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:10,983 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:10,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8704
2020-03-24 10:14:11,029 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9192
2020-03-24 10:14:11,029 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,029 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,046 [root] DEBUG: Loader: Injecting process 9192 (thread 8504) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,046 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:11,046 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9192
2020-03-24 10:14:11,076 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9192
2020-03-24 10:14:11,076 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,076 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,076 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,076 [root] DEBUG: Loader: Injecting process 9192 (thread 8504) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,076 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,076 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,076 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:11,076 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,076 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9192
2020-03-24 10:14:11,092 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8324
2020-03-24 10:14:11,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,092 [root] DEBUG: Loader: Injecting process 8324 (thread 8936) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,092 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:11,092 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8324
2020-03-24 10:14:11,108 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8324
2020-03-24 10:14:11,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,124 [root] DEBUG: Loader: Injecting process 8324 (thread 8936) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,124 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,124 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,124 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:11,124 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,124 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8324
2020-03-24 10:14:11,140 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8552
2020-03-24 10:14:11,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,140 [root] DEBUG: Loader: Injecting process 8552 (thread 8944) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,140 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:11,140 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8552
2020-03-24 10:14:11,154 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8552
2020-03-24 10:14:11,154 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,154 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,171 [root] DEBUG: Loader: Injecting process 8552 (thread 8944) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,171 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:11,171 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8552
2020-03-24 10:14:11,201 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8484
2020-03-24 10:14:11,201 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,201 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,201 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,201 [root] DEBUG: Loader: Injecting process 8484 (thread 8692) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,201 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,201 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,201 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:11,201 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,201 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8484
2020-03-24 10:14:11,217 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8484
2020-03-24 10:14:11,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:11,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:11,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:11,233 [root] DEBUG: Loader: Injecting process 8484 (thread 8692) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,233 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:11,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:11,233 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:11,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8484
2020-03-24 10:14:11,249 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8968
2020-03-24 10:14:14,259 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:14,259 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:14,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:14,259 [root] DEBUG: Loader: Injecting process 8968 (thread 8976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:14,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:14,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:14,259 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:14,259 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:14,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8968
2020-03-24 10:14:14,275 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8968
2020-03-24 10:14:14,275 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:14,275 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:14,275 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:14,275 [root] DEBUG: Loader: Injecting process 8968 (thread 8976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:14,275 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:14,275 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:14,290 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:14,290 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:14,290 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8968
2020-03-24 10:14:14,305 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8688
2020-03-24 10:14:23,322 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,322 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:23,322 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:23,322 [root] DEBUG: Loader: Injecting process 8688 (thread 8860) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,322 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,322 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,322 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:23,322 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,322 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8688
2020-03-24 10:14:23,338 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8688
2020-03-24 10:14:23,338 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,338 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:23,354 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:23,354 [root] DEBUG: Loader: Injecting process 8688 (thread 8860) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,354 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,354 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,354 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:23,354 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,354 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8688
2020-03-24 10:14:23,369 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8720
2020-03-24 10:14:23,369 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,369 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:23,369 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:23,369 [root] DEBUG: Loader: Injecting process 8720 (thread 8932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,369 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,369 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,369 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:23,369 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,369 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8720
2020-03-24 10:14:23,385 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8720
2020-03-24 10:14:23,401 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:23,401 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:23,401 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:23,401 [root] DEBUG: Loader: Injecting process 8720 (thread 8932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,401 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:23,401 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,401 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:23,401 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:23,401 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8720
2020-03-24 10:14:23,417 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9276
2020-03-24 10:14:26,443 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,443 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:26,443 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:26,443 [root] DEBUG: Loader: Injecting process 9276 (thread 9280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,443 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,443 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,443 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:26,443 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,443 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9276
2020-03-24 10:14:26,459 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9276
2020-03-24 10:14:26,459 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,459 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:26,459 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:26,459 [root] DEBUG: Loader: Injecting process 9276 (thread 9280) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,459 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,473 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,473 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:26,473 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,473 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9276
2020-03-24 10:14:26,490 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9372
2020-03-24 10:14:26,490 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,490 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:26,490 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:26,490 [root] DEBUG: Loader: Injecting process 9372 (thread 9376) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,490 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,490 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,490 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:26,490 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,490 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9372
2020-03-24 10:14:26,520 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9372
2020-03-24 10:14:26,520 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:26,520 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:26,520 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:26,520 [root] DEBUG: Loader: Injecting process 9372 (thread 9376) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,520 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:26,520 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,520 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:26,520 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:26,520 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9372
2020-03-24 10:14:26,536 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9468
2020-03-24 10:14:35,553 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,553 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:35,553 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:35,553 [root] DEBUG: Loader: Injecting process 9468 (thread 9472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,553 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,553 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,553 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:35,553 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,553 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9468
2020-03-24 10:14:35,569 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9468
2020-03-24 10:14:35,569 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,569 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:35,585 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:35,585 [root] DEBUG: Loader: Injecting process 9468 (thread 9472) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,585 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,585 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,585 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:35,585 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,585 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9468
2020-03-24 10:14:35,599 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9564
2020-03-24 10:14:35,599 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,599 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:35,599 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:35,599 [root] DEBUG: Loader: Injecting process 9564 (thread 9568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,599 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,599 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,599 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:35,599 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,599 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9564
2020-03-24 10:14:35,615 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9564
2020-03-24 10:14:35,615 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:35,615 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:35,631 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:35,631 [root] DEBUG: Loader: Injecting process 9564 (thread 9568) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,631 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:35,631 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,631 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:35,631 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:35,631 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9564
2020-03-24 10:14:35,647 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9660
2020-03-24 10:14:38,641 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,641 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:38,641 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:38,641 [root] DEBUG: Loader: Injecting process 9660 (thread 9664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,641 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,657 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,657 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:38,657 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,657 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9660
2020-03-24 10:14:38,657 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9660
2020-03-24 10:14:38,674 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,674 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:38,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:38,674 [root] DEBUG: Loader: Injecting process 9660 (thread 9664) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,674 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,674 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,674 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:38,674 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,674 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9660
2020-03-24 10:14:38,688 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9756
2020-03-24 10:14:38,688 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,688 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:38,688 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:38,688 [root] DEBUG: Loader: Injecting process 9756 (thread 9760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,688 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,688 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,688 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:38,688 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,688 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9756
2020-03-24 10:14:38,704 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9756
2020-03-24 10:14:38,704 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:38,704 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:38,720 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:38,720 [root] DEBUG: Loader: Injecting process 9756 (thread 9760) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,720 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:38,720 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,720 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:38,720 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:38,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9756
2020-03-24 10:14:38,736 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9852
2020-03-24 10:14:47,753 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:47,753 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:47,753 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:47,753 [root] DEBUG: Loader: Injecting process 9852 (thread 9856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,753 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:47,753 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,753 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:47,753 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,753 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9852
2020-03-24 10:14:47,767 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9852
2020-03-24 10:14:47,767 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:47,767 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:47,783 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:47,783 [root] DEBUG: Loader: Injecting process 9852 (thread 9856) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,783 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:47,799 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,799 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:47,799 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,799 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9852
2020-03-24 10:14:47,815 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9952
2020-03-24 10:14:47,815 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:47,815 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:47,815 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:47,815 [root] DEBUG: Loader: Injecting process 9952 (thread 9956) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,815 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:47,815 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,815 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:47,815 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,815 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9952
2020-03-24 10:14:47,831 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9952
2020-03-24 10:14:47,831 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:47,831 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:47,845 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:47,845 [root] DEBUG: Loader: Injecting process 9952 (thread 9956) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,845 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:47,845 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,845 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:47,845 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:47,845 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9952
2020-03-24 10:14:47,861 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10048
2020-03-24 10:14:50,872 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:50,872 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:50,872 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:50,872 [root] DEBUG: Loader: Injecting process 10048 (thread 10052) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,872 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:50,872 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,872 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:50,872 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,872 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10048
2020-03-24 10:14:50,888 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10048
2020-03-24 10:14:50,888 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:50,888 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:50,888 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:50,888 [root] DEBUG: Loader: Injecting process 10048 (thread 10052) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,904 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:50,904 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,904 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:50,904 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,920 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10048
2020-03-24 10:14:50,934 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10144
2020-03-24 10:14:50,934 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:50,934 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:50,934 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:50,934 [root] DEBUG: Loader: Injecting process 10144 (thread 10148) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,934 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:50,934 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,934 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:50,934 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,934 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10144
2020-03-24 10:14:50,950 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10144
2020-03-24 10:14:50,950 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:50,950 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:50,966 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:50,966 [root] DEBUG: Loader: Injecting process 10144 (thread 10148) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,966 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:50,966 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,966 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:14:50,966 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:50,966 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10144
2020-03-24 10:14:50,982 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8912
2020-03-24 10:14:59,999 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:14:59,999 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:14:59,999 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:14:59,999 [root] DEBUG: Loader: Injecting process 8912 (thread 8716) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:59,999 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:14:59,999 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:59,999 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:14:59,999 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:14:59,999 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8912
2020-03-24 10:15:00,013 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 8912
2020-03-24 10:15:00,013 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:00,013 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:00,013 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:00,013 [root] DEBUG: Loader: Injecting process 8912 (thread 8716) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,013 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:00,013 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,013 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:00,029 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,029 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8912
2020-03-24 10:15:00,046 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9344
2020-03-24 10:15:00,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:00,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:00,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:00,046 [root] DEBUG: Loader: Injecting process 9344 (thread 9348) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,046 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:00,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:00,046 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9344
2020-03-24 10:15:00,061 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9344
2020-03-24 10:15:00,061 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:00,061 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:00,061 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:00,061 [root] DEBUG: Loader: Injecting process 9344 (thread 9348) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,061 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:00,061 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,061 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:00,076 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:00,076 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9344
2020-03-24 10:15:00,092 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9456
2020-03-24 10:15:03,102 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:03,102 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:03,102 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:03,102 [root] DEBUG: Loader: Injecting process 9456 (thread 9460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,102 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:03,102 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,102 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:03,102 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,102 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9456
2020-03-24 10:15:03,118 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9456
2020-03-24 10:15:03,118 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:03,118 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:03,118 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:03,134 [root] DEBUG: Loader: Injecting process 9456 (thread 9460) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,134 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:03,134 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,134 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:03,134 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,134 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9456
2020-03-24 10:15:03,150 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9536
2020-03-24 10:15:03,150 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:03,150 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:03,150 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:03,150 [root] DEBUG: Loader: Injecting process 9536 (thread 9540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,150 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:03,150 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,150 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:03,150 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,150 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9536
2020-03-24 10:15:03,165 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9536
2020-03-24 10:15:03,165 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:03,165 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:03,180 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:03,180 [root] DEBUG: Loader: Injecting process 9536 (thread 9540) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,180 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:03,180 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,180 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:03,180 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:03,180 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9536
2020-03-24 10:15:03,197 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9648
2020-03-24 10:15:12,213 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:12,213 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:12,213 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:12,213 [root] DEBUG: Loader: Injecting process 9648 (thread 9652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,213 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:12,213 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,213 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:12,213 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,213 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9648
2020-03-24 10:15:12,229 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9648
2020-03-24 10:15:12,229 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:12,229 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:12,229 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:12,229 [root] DEBUG: Loader: Injecting process 9648 (thread 9652) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,229 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:12,229 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,229 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:12,229 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,229 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9648
2020-03-24 10:15:12,259 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9724
2020-03-24 10:15:12,259 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:12,259 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:12,259 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:12,259 [root] DEBUG: Loader: Injecting process 9724 (thread 9720) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,259 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:12,259 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,259 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:12,259 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,259 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9724
2020-03-24 10:15:12,276 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9724
2020-03-24 10:15:12,276 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:12,276 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:12,292 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:12,292 [root] DEBUG: Loader: Injecting process 9724 (thread 9720) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,292 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:12,292 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,292 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:12,292 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:12,292 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9724
2020-03-24 10:15:12,306 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9848
2020-03-24 10:15:15,318 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:15,318 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:15,318 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:15,318 [root] DEBUG: Loader: Injecting process 9848 (thread 932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,318 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:15,318 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,318 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:15,318 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,318 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9848
2020-03-24 10:15:15,334 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9848
2020-03-24 10:15:15,334 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:15,334 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:15,334 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:15,334 [root] DEBUG: Loader: Injecting process 9848 (thread 932) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,334 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:15,334 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,334 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:15,334 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,348 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9848
2020-03-24 10:15:15,365 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9984
2020-03-24 10:15:15,365 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:15,365 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:15,365 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:15,365 [root] DEBUG: Loader: Injecting process 9984 (thread 9988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,365 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:15,365 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,365 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:15,365 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,380 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9984
2020-03-24 10:15:15,395 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9984
2020-03-24 10:15:15,395 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:15,395 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:15,395 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:15,395 [root] DEBUG: Loader: Injecting process 9984 (thread 9988) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,395 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:15,395 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,395 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:15,395 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:15,395 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9984
2020-03-24 10:15:15,411 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10084
2020-03-24 10:15:24,428 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:24,428 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:24,428 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:24,428 [root] DEBUG: Loader: Injecting process 10084 (thread 10080) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,428 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:24,428 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,428 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:24,428 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,428 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10084
2020-03-24 10:15:24,444 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10084
2020-03-24 10:15:24,444 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:24,444 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:24,444 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:24,444 [root] DEBUG: Loader: Injecting process 10084 (thread 10080) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,460 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:24,460 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,460 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:24,460 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,460 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10084
2020-03-24 10:15:24,474 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10208
2020-03-24 10:15:24,474 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:24,474 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:24,474 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:24,474 [root] DEBUG: Loader: Injecting process 10208 (thread 10204) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,474 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:24,474 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,490 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:24,490 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,490 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10208
2020-03-24 10:15:24,506 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10208
2020-03-24 10:15:24,506 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:24,506 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:24,506 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:24,506 [root] DEBUG: Loader: Injecting process 10208 (thread 10204) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,506 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:24,506 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,506 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:24,506 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:24,506 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10208
2020-03-24 10:15:24,522 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9300
2020-03-24 10:15:27,532 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:27,532 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:27,532 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:27,532 [root] DEBUG: Loader: Injecting process 9300 (thread 9312) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,532 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:27,532 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,532 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:27,532 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,532 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9300
2020-03-24 10:15:27,549 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9300
2020-03-24 10:15:27,549 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:27,549 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:27,549 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:27,549 [root] DEBUG: Loader: Injecting process 9300 (thread 9312) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,549 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:27,549 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,549 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:27,549 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,549 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9300
2020-03-24 10:15:27,579 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9408
2020-03-24 10:15:27,579 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:27,579 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:27,579 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:27,579 [root] DEBUG: Loader: Injecting process 9408 (thread 9452) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,579 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:27,579 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,579 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:27,579 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,579 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9408
2020-03-24 10:15:27,595 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9408
2020-03-24 10:15:27,595 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:27,595 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:27,595 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:27,595 [root] DEBUG: Loader: Injecting process 9408 (thread 9452) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,595 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:27,611 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,611 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:27,611 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:27,611 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9408
2020-03-24 10:15:27,627 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9520
2020-03-24 10:15:36,642 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:36,642 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:36,642 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:36,642 [root] DEBUG: Loader: Injecting process 9520 (thread 9560) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,642 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:36,642 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,642 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:36,642 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,642 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9520
2020-03-24 10:15:36,658 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9520
2020-03-24 10:15:36,658 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:36,658 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:36,674 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:36,674 [root] DEBUG: Loader: Injecting process 9520 (thread 9560) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,674 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:36,674 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,674 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:36,674 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,674 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9520
2020-03-24 10:15:36,690 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9692
2020-03-24 10:15:36,690 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:36,690 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:36,690 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:36,690 [root] DEBUG: Loader: Injecting process 9692 (thread 9696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,706 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:36,706 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,706 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:36,706 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,706 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9692
2020-03-24 10:15:36,720 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9692
2020-03-24 10:15:36,720 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:36,720 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:36,720 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:36,720 [root] DEBUG: Loader: Injecting process 9692 (thread 9696) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,720 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:36,720 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,720 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:36,720 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:36,720 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9692
2020-03-24 10:15:36,736 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9784
2020-03-24 10:15:39,747 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:39,747 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:39,747 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:39,747 [root] DEBUG: Loader: Injecting process 9784 (thread 9752) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,747 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:39,747 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,747 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:39,747 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,747 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9784
2020-03-24 10:15:39,763 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9784
2020-03-24 10:15:39,763 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:39,763 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:39,763 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:39,779 [root] DEBUG: Loader: Injecting process 9784 (thread 9752) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,779 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:39,779 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,779 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:39,779 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,779 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9784
2020-03-24 10:15:39,795 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9880
2020-03-24 10:15:39,795 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:39,795 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:39,795 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:39,795 [root] DEBUG: Loader: Injecting process 9880 (thread 9876) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,795 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:39,795 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,795 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:39,795 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,795 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9880
2020-03-24 10:15:39,809 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9880
2020-03-24 10:15:39,809 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:39,809 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:39,809 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:39,809 [root] DEBUG: Loader: Injecting process 9880 (thread 9876) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,809 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:39,809 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,809 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:39,809 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:39,809 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9880
2020-03-24 10:15:39,825 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10000
2020-03-24 10:15:48,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:48,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:48,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:48,842 [root] DEBUG: Loader: Injecting process 10000 (thread 9976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,842 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:48,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:48,842 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10000
2020-03-24 10:15:48,858 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10000
2020-03-24 10:15:48,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:48,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:48,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:48,874 [root] DEBUG: Loader: Injecting process 10000 (thread 9976) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,874 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:48,874 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,874 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:48,874 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,874 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10000
2020-03-24 10:15:48,888 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1140
2020-03-24 10:15:48,888 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:48,888 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:48,888 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:48,888 [root] DEBUG: Loader: Injecting process 1140 (thread 1748) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,888 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:48,888 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,888 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:48,888 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,888 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1140
2020-03-24 10:15:48,904 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1140
2020-03-24 10:15:48,904 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:48,904 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:48,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:48,921 [root] DEBUG: Loader: Injecting process 1140 (thread 1748) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,921 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:48,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:48,921 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:48,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1140
2020-03-24 10:15:48,936 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10228
2020-03-24 10:15:51,947 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:51,947 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:51,947 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:51,947 [root] DEBUG: Loader: Injecting process 10228 (thread 10164) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,947 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:51,947 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,947 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:51,947 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,947 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10228
2020-03-24 10:15:51,963 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10228
2020-03-24 10:15:51,963 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:51,963 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:51,963 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:51,963 [root] DEBUG: Loader: Injecting process 10228 (thread 10164) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,963 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:51,963 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,963 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:51,963 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,963 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10228
2020-03-24 10:15:51,977 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9244
2020-03-24 10:15:51,977 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:51,977 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:51,977 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:51,977 [root] DEBUG: Loader: Injecting process 9244 (thread 9324) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,977 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:51,977 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,977 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:15:51,977 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,977 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9244
2020-03-24 10:15:51,993 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9244
2020-03-24 10:15:51,993 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:15:51,993 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:15:51,993 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:15:51,993 [root] DEBUG: Loader: Injecting process 9244 (thread 9324) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,993 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:15:51,993 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,993 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:15:51,993 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:15:51,993 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9244
2020-03-24 10:15:52,009 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1804
2020-03-24 10:16:01,026 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:01,026 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:01,026 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:01,026 [root] DEBUG: Loader: Injecting process 1804 (thread 9464) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,026 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:01,026 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,026 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:01,026 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,026 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1804
2020-03-24 10:16:01,042 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1804
2020-03-24 10:16:01,042 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:01,042 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:01,042 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:01,042 [root] DEBUG: Loader: Injecting process 1804 (thread 9464) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,042 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:01,042 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,042 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:01,042 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,042 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1804
2020-03-24 10:16:01,072 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9556
2020-03-24 10:16:01,072 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:01,072 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:01,072 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:01,072 [root] DEBUG: Loader: Injecting process 9556 (thread 9528) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,072 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:01,072 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,072 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:01,072 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,072 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9556
2020-03-24 10:16:01,088 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9556
2020-03-24 10:16:01,088 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:01,088 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:01,104 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:01,104 [root] DEBUG: Loader: Injecting process 9556 (thread 9528) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,104 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:01,104 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,104 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:01,104 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:01,104 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9556
2020-03-24 10:16:01,119 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9796
2020-03-24 10:16:04,131 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:04,131 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:04,131 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:04,131 [root] DEBUG: Loader: Injecting process 9796 (thread 9804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,131 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:04,131 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,131 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:04,131 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,131 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9796
2020-03-24 10:16:04,145 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9796
2020-03-24 10:16:04,145 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:04,145 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:04,161 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:04,161 [root] DEBUG: Loader: Injecting process 9796 (thread 9804) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,161 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:04,161 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,161 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:04,161 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,161 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9796
2020-03-24 10:16:04,177 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9884
2020-03-24 10:16:04,177 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:04,177 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:04,177 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:04,177 [root] DEBUG: Loader: Injecting process 9884 (thread 1452) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,177 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:04,177 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,177 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:04,177 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,177 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9884
2020-03-24 10:16:04,193 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9884
2020-03-24 10:16:04,193 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:04,193 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:04,209 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:04,209 [root] DEBUG: Loader: Injecting process 9884 (thread 1452) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,209 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:04,209 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,209 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:04,209 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:04,209 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9884
2020-03-24 10:16:04,223 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9940
2020-03-24 10:16:13,240 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:13,240 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:13,240 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:13,240 [root] DEBUG: Loader: Injecting process 9940 (thread 10036) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,240 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:13,240 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,240 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:13,240 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,240 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9940
2020-03-24 10:16:13,256 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9940
2020-03-24 10:16:13,256 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:13,256 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:13,256 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:13,256 [root] DEBUG: Loader: Injecting process 9940 (thread 10036) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,256 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:13,256 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,272 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:13,272 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,272 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9940
2020-03-24 10:16:13,288 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10120
2020-03-24 10:16:13,288 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:13,288 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:13,288 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:13,288 [root] DEBUG: Loader: Injecting process 10120 (thread 1620) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,288 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:13,288 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,288 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:13,288 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,288 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10120
2020-03-24 10:16:13,302 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10120
2020-03-24 10:16:13,302 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:13,302 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:13,302 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:13,302 [root] DEBUG: Loader: Injecting process 10120 (thread 1620) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,319 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:13,319 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,319 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:13,319 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:13,319 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10120
2020-03-24 10:16:13,335 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9252
2020-03-24 10:16:16,345 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:16,345 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:16,345 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:16,345 [root] DEBUG: Loader: Injecting process 9252 (thread 1108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,345 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:16,345 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,345 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:16,345 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,345 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9252
2020-03-24 10:16:16,361 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9252
2020-03-24 10:16:16,361 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:16,361 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:16,361 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:16,361 [root] DEBUG: Loader: Injecting process 9252 (thread 1108) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,361 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:16,361 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,377 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:16,377 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,377 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9252
2020-03-24 10:16:16,391 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9328
2020-03-24 10:16:16,391 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:16,391 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:16,391 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:16,391 [root] DEBUG: Loader: Injecting process 9328 (thread 9368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,391 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:16,391 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,391 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:16,391 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,391 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9328
2020-03-24 10:16:16,423 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9328
2020-03-24 10:16:16,423 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:16,423 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:16,423 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:16,423 [root] DEBUG: Loader: Injecting process 9328 (thread 9368) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,423 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:16,423 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,423 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:16,423 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:16,423 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9328
2020-03-24 10:16:16,438 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9488
2020-03-24 10:16:25,456 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:25,456 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:25,456 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:25,456 [root] DEBUG: Loader: Injecting process 9488 (thread 9552) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,470 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:25,470 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,470 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:25,470 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,470 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9488
2020-03-24 10:16:25,486 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9488
2020-03-24 10:16:25,486 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:25,486 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:25,486 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:25,486 [root] DEBUG: Loader: Injecting process 9488 (thread 9552) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,486 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:25,486 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,486 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:25,503 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,503 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9488
2020-03-24 10:16:25,517 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9740
2020-03-24 10:16:25,517 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:25,517 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:25,517 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:25,517 [root] DEBUG: Loader: Injecting process 9740 (thread 9736) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,517 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:25,517 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,517 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:25,517 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,517 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9740
2020-03-24 10:16:25,533 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9740
2020-03-24 10:16:25,533 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:25,533 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:25,533 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:25,533 [root] DEBUG: Loader: Injecting process 9740 (thread 9736) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,533 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:25,533 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,533 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:25,533 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:25,549 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9740
2020-03-24 10:16:25,565 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9824
2020-03-24 10:16:28,575 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:28,575 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:28,575 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:28,575 [root] DEBUG: Loader: Injecting process 9824 (thread 452) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,575 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:28,575 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,575 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:28,575 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,575 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9824
2020-03-24 10:16:28,591 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9824
2020-03-24 10:16:28,591 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:28,591 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:28,591 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:28,591 [root] DEBUG: Loader: Injecting process 9824 (thread 452) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,591 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:28,591 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,591 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:28,591 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,591 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9824
2020-03-24 10:16:28,622 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10012
2020-03-24 10:16:28,622 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:28,622 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:28,622 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:28,622 [root] DEBUG: Loader: Injecting process 10012 (thread 10068) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,622 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:28,622 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,622 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:28,622 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,622 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10012
2020-03-24 10:16:28,638 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10012
2020-03-24 10:16:28,638 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:28,638 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:28,638 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:28,638 [root] DEBUG: Loader: Injecting process 10012 (thread 10068) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,638 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:28,654 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,654 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:28,654 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:28,654 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10012
2020-03-24 10:16:28,668 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10140
2020-03-24 10:16:37,686 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:37,686 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:37,686 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:37,686 [root] DEBUG: Loader: Injecting process 10140 (thread 10100) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,686 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:37,686 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,686 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:37,686 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,686 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10140
2020-03-24 10:16:37,701 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 10140
2020-03-24 10:16:37,701 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:37,701 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:37,701 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:37,701 [root] DEBUG: Loader: Injecting process 10140 (thread 10100) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,701 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:37,701 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:37,717 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10140
2020-03-24 10:16:37,733 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9292
2020-03-24 10:16:37,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:37,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:37,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:37,733 [root] DEBUG: Loader: Injecting process 9292 (thread 9232) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,733 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:37,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:37,733 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9292
2020-03-24 10:16:37,749 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9292
2020-03-24 10:16:37,749 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:37,749 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:37,749 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:37,749 [root] DEBUG: Loader: Injecting process 9292 (thread 9232) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,749 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:37,749 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,763 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:37,763 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:37,763 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9292
2020-03-24 10:16:37,779 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1060
2020-03-24 10:16:40,790 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:40,790 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:40,790 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:40,790 [root] DEBUG: Loader: Injecting process 1060 (thread 9224) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,790 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:40,790 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,790 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:40,790 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,790 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1060
2020-03-24 10:16:40,805 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 1060
2020-03-24 10:16:40,805 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:40,805 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:40,822 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:40,822 [root] DEBUG: Loader: Injecting process 1060 (thread 9224) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,822 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:40,822 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,822 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:40,822 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,822 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1060
2020-03-24 10:16:40,836 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9640
2020-03-24 10:16:40,836 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:40,836 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:40,836 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:40,836 [root] DEBUG: Loader: Injecting process 9640 (thread 9792) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,836 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:40,836 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,836 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:40,836 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,836 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9640
2020-03-24 10:16:40,852 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 9640
2020-03-24 10:16:40,852 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:40,852 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:40,868 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:40,868 [root] DEBUG: Loader: Injecting process 9640 (thread 9792) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,868 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:40,868 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,868 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:40,868 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:40,868 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9640
2020-03-24 10:16:40,884 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 256
2020-03-24 10:16:49,901 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:49,901 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:49,901 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:49,901 [root] DEBUG: Loader: Injecting process 256 (thread 10020) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:49,901 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:49,901 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:49,901 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:49,917 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:49,917 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 256
2020-03-24 10:16:49,917 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 256
2020-03-24 10:16:49,931 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:49,931 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:49,931 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:49,931 [root] DEBUG: Loader: Injecting process 256 (thread 10020) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:49,931 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:49,931 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:49,931 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-03-24 10:16:49,931 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:49,931 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 256
2020-03-24 10:16:49,947 [root] INFO: Announced 32-bit process name: ANIIaZ.exe pid: 980
2020-03-24 10:16:52,536 [root] INFO: Analysis timeout hit (200 seconds), terminating analysis.
2020-03-24 10:16:52,536 [root] INFO: Created shutdown mutex.
2020-03-24 10:16:52,959 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-03-24 10:16:52,959 [lib.api.process] INFO: 32-bit DLL to inject is C:\xecgmpuhuy\dll\JMUezP.dll, loader C:\xecgmpuhuy\bin\xauSOHB.exe
2020-03-24 10:16:52,959 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\cAcfwi.
2020-03-24 10:16:52,959 [root] DEBUG: Loader: Injecting process 980 (thread 808) with C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:52,959 [root] DEBUG: Process image base: 0x00400000
2020-03-24 10:16:52,959 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:52,959 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-03-24 10:16:52,959 [root] DEBUG: Successfully injected DLL C:\xecgmpuhuy\dll\JMUezP.dll.
2020-03-24 10:16:52,959 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 980
2020-03-24 10:16:53,005 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 1420
2020-03-24 10:16:53,005 [root] DEBUG: GetHookCallerBase: thread 1312 (handle 0x0), return address 0x0041158B, allocation base 0x00410000.
2020-03-24 10:16:53,020 [root] DEBUG: DumpInterestingRegions: Dumping Imagebase at 0x00400000.
2020-03-24 10:16:53,020 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump virtual PE image.
2020-03-24 10:16:53,020 [root] DEBUG: DumpProcess: Instantiating PeParser with address: 0x00400000.
2020-03-24 10:16:53,020 [root] DEBUG: DumpProcess: Module entry point VA is 0x00001254.
2020-03-24 10:16:53,020 [root] INFO: Added new CAPE file to list with path: C:\ohDlfTRA\CAPE\1420_20379628151431524232020
2020-03-24 10:16:53,020 [root] DEBUG: DumpProcess: Module image dump success - dump size 0xb800.
2020-03-24 10:16:53,020 [root] DEBUG: DumpInterestingRegions: Dumping calling region at 0x00410000.
2020-03-24 10:16:53,020 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\ohDlfTRA\CAPE\1420_11790372131431524232020
2020-03-24 10:16:53,551 [lib.api.process] INFO: Terminate event set for process 1420
2020-03-24 10:16:53,551 [root] DEBUG: Terminate Event: Process 1420 has already been dumped(!)
2020-03-24 10:16:53,551 [lib.api.process] INFO: Termination confirmed for process 1420
2020-03-24 10:16:53,551 [root] INFO: Terminate event set for process 1420.
2020-03-24 10:16:53,551 [root] DEBUG: Terminate Event: CAPE shutdown complete for process 1420
2020-03-24 10:16:53,551 [root] INFO: Terminating process 1420 before shutdown.
2020-03-24 10:16:53,551 [root] INFO: Waiting for process 1420 to exit.
2020-03-24 10:16:54,565 [root] INFO: Shutting down package.
2020-03-24 10:16:54,565 [root] INFO: Stopping auxiliary modules.
2020-03-24 10:16:54,565 [root] INFO: Added new CAPE file to list with path: C:\ohDlfTRA\CAPE\1420_11790372131431524232020
2020-03-24 10:16:54,565 [root] INFO: Finishing auxiliary modules.
2020-03-24 10:16:54,565 [root] INFO: Shutting down pipe server and dumping dropped files.
2020-03-24 10:16:54,565 [root] WARNING: File at path "C:\ohDlfTRA\debugger" does not exist, skip.
2020-03-24 10:16:54,565 [root] WARNING: Monitor injection attempted but failed for process 1964.
2020-03-24 10:16:54,565 [root] WARNING: Monitor injection attempted but failed for process 1600.
2020-03-24 10:16:54,565 [root] WARNING: Monitor injection attempted but failed for process 1068.
2020-03-24 10:16:54,565 [root] WARNING: Monitor injection attempted but failed for process 1740.
2020-03-24 10:16:54,565 [root] WARNING: Monitor injection attempted but failed for process 332.
2020-03-24 10:16:54,565 [root] WARNING: Monitor injection attempted but failed for process 1932.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 1000.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 1376.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 1780.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2120.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2216.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2312.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2408.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2504.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2600.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2704.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2800.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2896.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2992.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2068.
2020-03-24 10:16:54,581 [root] WARNING: Monitor injection attempted but failed for process 2136.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2296.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2372.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2532.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 112.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2680.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2792.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2852.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 3028.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2096.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2240.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2400.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2484.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 260.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2736.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2756.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2948.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 3048.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2252.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2456.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2524.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2664.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2788.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 3024.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2160.
2020-03-24 10:16:54,596 [root] WARNING: Monitor injection attempted but failed for process 2340.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2552.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 1924.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2820.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2104.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2168.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2360.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2592.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2868.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 3012.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2380.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 1324.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2696.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2140.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2492.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2424.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2936.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2204.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2444.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2260.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2464.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2816.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2392.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2976.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2588.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2384.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2964.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2848.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 3044.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 2720.
2020-03-24 10:16:54,611 [root] WARNING: Monitor injection attempted but failed for process 788.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 2560.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 2076.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3152.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3248.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3344.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3440.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3536.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3632.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3728.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3824.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3920.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 4016.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3100.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3168.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3328.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3404.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3564.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3676.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3744.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3904.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3980.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3132.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3244.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3308.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3500.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3600.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3792.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3960.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 4044.
2020-03-24 10:16:54,628 [root] WARNING: Monitor injection attempted but failed for process 3216.
2020-03-24 10:16:54,642 [root] WARNING: Monitor injection attempted but failed for process 3324.
2020-03-24 10:16:54,642 [root] WARNING: Monitor injection attempted but failed for process 3532.
2020-03-24 10:16:54,642 [root] WARNING: Monitor injection attempted bu