CAPE

Analysis

Category Package Started Completed Duration Options Log
FILE exe 2020-02-14 14:43:03 2020-02-14 14:50:29 446 seconds Show Options Show Log
  • Info: The analysis hit the critical timeout, terminating.
route = inetsim
procdump = 1
2020-02-14 15:43:18,030 [root] INFO: Date set to: 02-14-20, time set to: 14:43:18, timeout set to: 200
2020-02-14 15:43:21,453 [root] DEBUG: Starting analyzer from: C:\qxodz
2020-02-14 15:43:21,467 [root] DEBUG: Storing results at: C:\SOZTca
2020-02-14 15:43:21,467 [root] DEBUG: Pipe server name: \\.\PIPE\yjpHnQyLrU
2020-02-14 15:43:21,467 [root] DEBUG: No analysis package specified, trying to detect it automagically.
2020-02-14 15:43:21,467 [root] INFO: Automatically selected analysis package "exe"
2020-02-14 15:43:45,655 [root] DEBUG: Started auxiliary module Browser
2020-02-14 15:43:45,655 [root] DEBUG: Started auxiliary module Curtain
2020-02-14 15:43:45,655 [modules.auxiliary.digisig] DEBUG: Checking for a digitial signature.
2020-02-14 15:43:51,015 [modules.auxiliary.digisig] DEBUG: File is not signed.
2020-02-14 15:43:51,015 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2020-02-14 15:43:51,015 [root] DEBUG: Started auxiliary module DigiSig
2020-02-14 15:43:51,015 [root] DEBUG: Started auxiliary module Disguise
2020-02-14 15:43:51,015 [root] DEBUG: Started auxiliary module Human
2020-02-14 15:43:51,015 [root] DEBUG: Started auxiliary module Screenshots
2020-02-14 15:43:51,015 [root] DEBUG: Started auxiliary module Sysmon
2020-02-14 15:43:51,030 [root] DEBUG: Started auxiliary module Usage
2020-02-14 15:43:51,030 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL option
2020-02-14 15:43:51,030 [root] INFO: Analyzer: Package modules.packages.exe does not specify a DLL_64 option
2020-02-14 15:43:58,515 [lib.api.process] INFO: Successfully executed process from path "C:\Users\Rebecca\AppData\Local\Temp\PRODUCT INQUIRY.exe" with arguments "" with pid 2512
2020-02-14 15:44:37,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:37,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:37,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:37,875 [root] DEBUG: Loader: Injecting process 2512 (thread 3196) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:37,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:37,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:37,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:37,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:37,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2512
2020-02-14 15:44:39,967 [lib.api.process] INFO: Successfully resumed process with pid 2512
2020-02-14 15:44:39,967 [root] INFO: Added new process to list with pid: 2512
2020-02-14 15:44:46,000 [root] DEBUG: Terminate processes on terminate_event disabled.
2020-02-14 15:44:46,046 [root] DEBUG: Process dumps enabled.
2020-02-14 15:44:46,358 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-02-14 15:44:46,405 [root] INFO: Disabling sleep skipping.
2020-02-14 15:44:46,405 [root] INFO: Disabling sleep skipping.
2020-02-14 15:44:46,421 [root] INFO: Disabling sleep skipping.
2020-02-14 15:44:46,421 [root] INFO: Disabling sleep skipping.
2020-02-14 15:44:46,467 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 2512 at 0x6d010000, image base 0x400000, stack from 0x126000-0x130000
2020-02-14 15:44:47,046 [root] DEBUG: Commandline: C:\Users\Rebecca\AppData\Local\Temp\"C:\Users\Rebecca\AppData\Local\Temp\PRODUCT INQUIRY.exe".
2020-02-14 15:44:47,108 [root] INFO: Monitor successfully loaded in process with pid 2512.
2020-02-14 15:44:47,390 [root] DEBUG: DLL loaded at 0x75920000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2020-02-14 15:44:47,453 [root] DEBUG: DLL loaded at 0x75930000: C:\Windows\system32\SXS (0x5f000 bytes).
2020-02-14 15:44:48,608 [root] DEBUG: DLL loaded at 0x74EC0000: C:\Windows\system32\VERSION (0x9000 bytes).
2020-02-14 15:44:48,655 [root] DEBUG: DLL unloaded from 0x00400000.
2020-02-14 15:44:51,921 [root] DEBUG: set_caller_info: Adding region at 0x00300000 to caller regions list (ntdll::LdrGetProcedureAddress).
2020-02-14 15:44:51,953 [root] DEBUG: DLL loaded at 0x77060000: C:\Windows\system32\shell32 (0xc4c000 bytes).
2020-02-14 15:44:52,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1924
2020-02-14 15:44:52,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:52,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:52,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:52,046 [root] DEBUG: Loader: Injecting process 1924 (thread 3396) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:52,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:52,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:52,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:52,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:52,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1924
2020-02-14 15:44:52,046 [root] DEBUG: DLL loaded at 0x758D0000: C:\Windows\system32\apphelp (0x4c000 bytes).
2020-02-14 15:44:52,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1924
2020-02-14 15:44:52,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:52,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:52,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:52,108 [root] DEBUG: Loader: Injecting process 1924 (thread 3396) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:52,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:52,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:52,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:52,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:52,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1924
2020-02-14 15:44:52,108 [root] DEBUG: NtTerminateProcess hook: Attempting to dump process 2512
2020-02-14 15:44:52,108 [root] DEBUG: GetHookCallerBase: thread 3196 (handle 0x0), return address 0x00302A68, allocation base 0x00300000.
2020-02-14 15:44:52,108 [root] DEBUG: DumpInterestingRegions: Dumping calling region at 0x00300000.
2020-02-14 15:44:52,328 [root] INFO: Added new CAPE file to list with path: C:\SOZTca\CAPE\2512_58774674652441514522020
2020-02-14 15:44:52,342 [root] DEBUG: DumpMemory: CAPE output file successfully created: C:\SOZTca\CAPE\2512_58774674652441514522020 (size 0x7000)
2020-02-14 15:44:52,342 [root] DEBUG: DumpRegion: Dumped stack region from 0x00300000, size 0x7000.
2020-02-14 15:44:52,342 [root] DEBUG: DumpInterestingRegions: Dumping Imagebase at 0x00400000.
2020-02-14 15:44:52,342 [root] DEBUG: DumpImageInCurrentProcess: Attempting to dump 'raw' PE image.
2020-02-14 15:44:52,342 [root] DEBUG: DumpPE: Instantiating PeParser with address: 0x00400000.
2020-02-14 15:44:54,467 [root] INFO: Added new CAPE file to list with path: C:\SOZTca\CAPE\2512_194673307952441514522020
2020-02-14 15:44:54,467 [root] DEBUG: DumpPE: PE file in memory dumped successfully - dump size 0xf000.
2020-02-14 15:44:54,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2824
2020-02-14 15:44:54,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,500 [root] DEBUG: Loader: Injecting process 2824 (thread 2804) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:54,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2824
2020-02-14 15:44:54,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2824
2020-02-14 15:44:54,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,530 [root] DEBUG: Loader: Injecting process 2824 (thread 2804) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:54,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2824
2020-02-14 15:44:54,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1196
2020-02-14 15:44:54,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,562 [root] DEBUG: Loader: Injecting process 1196 (thread 1540) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:54,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1196
2020-02-14 15:44:54,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1196
2020-02-14 15:44:54,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,625 [root] DEBUG: Loader: Injecting process 1196 (thread 1540) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:54,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1196
2020-02-14 15:44:54,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2832
2020-02-14 15:44:54,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,687 [root] DEBUG: Loader: Injecting process 2832 (thread 2940) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:54,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2832
2020-02-14 15:44:54,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2832
2020-02-14 15:44:54,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,733 [root] DEBUG: Loader: Injecting process 2832 (thread 2940) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:54,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2832
2020-02-14 15:44:54,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3004
2020-02-14 15:44:54,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,765 [root] DEBUG: Loader: Injecting process 3004 (thread 2324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:54,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3004
2020-02-14 15:44:54,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3004
2020-02-14 15:44:54,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:54,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:54,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:54,796 [root] DEBUG: Loader: Injecting process 3004 (thread 2324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:54,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:54,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:54,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3004
2020-02-14 15:44:54,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3036
2020-02-14 15:44:55,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:55,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:55,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:55,390 [root] DEBUG: Loader: Injecting process 3036 (thread 3040) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:55,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:55,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:55,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:55,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:55,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3036
2020-02-14 15:44:55,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3036
2020-02-14 15:44:55,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:55,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:55,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:55,437 [root] DEBUG: Loader: Injecting process 3036 (thread 3040) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:55,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:55,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:55,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:55,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:55,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3036
2020-02-14 15:44:55,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3124
2020-02-14 15:44:55,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:55,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,155 [root] DEBUG: Loader: Injecting process 3124 (thread 2812) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3124
2020-02-14 15:44:56,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3124
2020-02-14 15:44:56,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,187 [root] DEBUG: Loader: Injecting process 3124 (thread 2812) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3124
2020-02-14 15:44:56,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3588
2020-02-14 15:44:56,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,217 [root] DEBUG: Loader: Injecting process 3588 (thread 3144) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3588
2020-02-14 15:44:56,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3588
2020-02-14 15:44:56,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,250 [root] DEBUG: Loader: Injecting process 3588 (thread 3144) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3588
2020-02-14 15:44:56,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3220
2020-02-14 15:44:56,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,280 [root] DEBUG: Loader: Injecting process 3220 (thread 3468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3220
2020-02-14 15:44:56,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3220
2020-02-14 15:44:56,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,312 [root] DEBUG: Loader: Injecting process 3220 (thread 3468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3220
2020-02-14 15:44:56,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3456
2020-02-14 15:44:56,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,342 [root] DEBUG: Loader: Injecting process 3456 (thread 3212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3456
2020-02-14 15:44:56,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3456
2020-02-14 15:44:56,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,375 [root] DEBUG: Loader: Injecting process 3456 (thread 3212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3456
2020-02-14 15:44:56,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1108
2020-02-14 15:44:56,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,405 [root] DEBUG: Loader: Injecting process 1108 (thread 3400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1108
2020-02-14 15:44:56,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1108
2020-02-14 15:44:56,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,437 [root] DEBUG: Loader: Injecting process 1108 (thread 3400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1108
2020-02-14 15:44:56,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3548
2020-02-14 15:44:56,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,453 [root] DEBUG: Loader: Injecting process 3548 (thread 3696) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3548
2020-02-14 15:44:56,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3548
2020-02-14 15:44:56,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,467 [root] DEBUG: Loader: Injecting process 3548 (thread 3696) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3548
2020-02-14 15:44:56,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3572
2020-02-14 15:44:56,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,500 [root] DEBUG: Loader: Injecting process 3572 (thread 3864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3572
2020-02-14 15:44:56,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3572
2020-02-14 15:44:56,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,530 [root] DEBUG: Loader: Injecting process 3572 (thread 3864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3572
2020-02-14 15:44:56,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3860
2020-02-14 15:44:56,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,546 [root] DEBUG: Loader: Injecting process 3860 (thread 3804) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3860
2020-02-14 15:44:56,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3860
2020-02-14 15:44:56,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,578 [root] DEBUG: Loader: Injecting process 3860 (thread 3804) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3860
2020-02-14 15:44:56,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1456
2020-02-14 15:44:56,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,625 [root] DEBUG: Loader: Injecting process 1456 (thread 3956) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1456
2020-02-14 15:44:56,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1456
2020-02-14 15:44:56,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,640 [root] DEBUG: Loader: Injecting process 1456 (thread 3956) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1456
2020-02-14 15:44:56,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2276
2020-02-14 15:44:56,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,671 [root] DEBUG: Loader: Injecting process 2276 (thread 3752) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2276
2020-02-14 15:44:56,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2276
2020-02-14 15:44:56,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,717 [root] DEBUG: Loader: Injecting process 2276 (thread 3752) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2276
2020-02-14 15:44:56,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4064
2020-02-14 15:44:56,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,780 [root] DEBUG: Loader: Injecting process 4064 (thread 2140) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4064
2020-02-14 15:44:56,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4064
2020-02-14 15:44:56,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,796 [root] DEBUG: Loader: Injecting process 4064 (thread 2140) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4064
2020-02-14 15:44:56,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4028
2020-02-14 15:44:56,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,828 [root] DEBUG: Loader: Injecting process 4028 (thread 2264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4028
2020-02-14 15:44:56,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4028
2020-02-14 15:44:56,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,858 [root] DEBUG: Loader: Injecting process 4028 (thread 2264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4028
2020-02-14 15:44:56,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 248
2020-02-14 15:44:56,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,875 [root] DEBUG: Loader: Injecting process 248 (thread 2728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 248
2020-02-14 15:44:56,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 248
2020-02-14 15:44:56,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,890 [root] DEBUG: Loader: Injecting process 248 (thread 2728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 248
2020-02-14 15:44:56,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2184
2020-02-14 15:44:56,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,953 [root] DEBUG: Loader: Injecting process 2184 (thread 2856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:56,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2184
2020-02-14 15:44:56,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2184
2020-02-14 15:44:56,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:56,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:56,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:56,983 [root] DEBUG: Loader: Injecting process 2184 (thread 2856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:56,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:56,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:56,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2184
2020-02-14 15:44:57,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 712
2020-02-14 15:44:57,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,000 [root] DEBUG: Loader: Injecting process 712 (thread 1580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 712
2020-02-14 15:44:57,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 712
2020-02-14 15:44:57,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,030 [root] DEBUG: Loader: Injecting process 712 (thread 1580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 712
2020-02-14 15:44:57,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 888
2020-02-14 15:44:57,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,062 [root] DEBUG: Loader: Injecting process 888 (thread 1332) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 888
2020-02-14 15:44:57,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 888
2020-02-14 15:44:57,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,078 [root] DEBUG: Loader: Injecting process 888 (thread 1332) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 888
2020-02-14 15:44:57,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3768
2020-02-14 15:44:57,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,358 [root] DEBUG: Loader: Injecting process 3768 (thread 2468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3768
2020-02-14 15:44:57,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3768
2020-02-14 15:44:57,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,375 [root] DEBUG: Loader: Injecting process 3768 (thread 2468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3768
2020-02-14 15:44:57,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1940
2020-02-14 15:44:57,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,405 [root] DEBUG: Loader: Injecting process 1940 (thread 1892) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1940
2020-02-14 15:44:57,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1940
2020-02-14 15:44:57,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,453 [root] DEBUG: Loader: Injecting process 1940 (thread 1892) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1940
2020-02-14 15:44:57,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2592
2020-02-14 15:44:57,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,467 [root] DEBUG: Loader: Injecting process 2592 (thread 1292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2592
2020-02-14 15:44:57,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2592
2020-02-14 15:44:57,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,500 [root] DEBUG: Loader: Injecting process 2592 (thread 1292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2592
2020-02-14 15:44:57,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2732
2020-02-14 15:44:57,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,733 [root] DEBUG: Loader: Injecting process 2732 (thread 2872) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2732
2020-02-14 15:44:57,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2732
2020-02-14 15:44:57,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,765 [root] DEBUG: Loader: Injecting process 2732 (thread 2872) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2732
2020-02-14 15:44:57,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2228
2020-02-14 15:44:57,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,780 [root] DEBUG: Loader: Injecting process 2228 (thread 3000) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2228
2020-02-14 15:44:57,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2228
2020-02-14 15:44:57,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,812 [root] DEBUG: Loader: Injecting process 2228 (thread 3000) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2228
2020-02-14 15:44:57,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2916
2020-02-14 15:44:57,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,842 [root] DEBUG: Loader: Injecting process 2916 (thread 3228) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2916
2020-02-14 15:44:57,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2916
2020-02-14 15:44:57,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,890 [root] DEBUG: Loader: Injecting process 2916 (thread 3228) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2916
2020-02-14 15:44:57,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3312
2020-02-14 15:44:57,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,905 [root] DEBUG: Loader: Injecting process 3312 (thread 3360) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3312
2020-02-14 15:44:57,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3312
2020-02-14 15:44:57,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,937 [root] DEBUG: Loader: Injecting process 3312 (thread 3360) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3312
2020-02-14 15:44:57,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1900
2020-02-14 15:44:57,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,953 [root] DEBUG: Loader: Injecting process 1900 (thread 3284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:57,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1900
2020-02-14 15:44:57,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1900
2020-02-14 15:44:57,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:57,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:57,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:57,983 [root] DEBUG: Loader: Injecting process 1900 (thread 3284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:57,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:57,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:57,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1900
2020-02-14 15:44:58,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3392
2020-02-14 15:44:58,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,000 [root] DEBUG: Loader: Injecting process 3392 (thread 3352) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3392
2020-02-14 15:44:58,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3392
2020-02-14 15:44:58,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,030 [root] DEBUG: Loader: Injecting process 3392 (thread 3352) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3392
2020-02-14 15:44:58,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3812
2020-02-14 15:44:58,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,092 [root] DEBUG: Loader: Injecting process 3812 (thread 2756) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3812
2020-02-14 15:44:58,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3812
2020-02-14 15:44:58,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,125 [root] DEBUG: Loader: Injecting process 3812 (thread 2756) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3812
2020-02-14 15:44:58,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3688
2020-02-14 15:44:58,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,140 [root] DEBUG: Loader: Injecting process 3688 (thread 3900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3688
2020-02-14 15:44:58,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3688
2020-02-14 15:44:58,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,171 [root] DEBUG: Loader: Injecting process 3688 (thread 3900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3688
2020-02-14 15:44:58,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3760
2020-02-14 15:44:58,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,187 [root] DEBUG: Loader: Injecting process 3760 (thread 3756) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3760
2020-02-14 15:44:58,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3760
2020-02-14 15:44:58,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,217 [root] DEBUG: Loader: Injecting process 3760 (thread 3756) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3760
2020-02-14 15:44:58,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3976
2020-02-14 15:44:58,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,233 [root] DEBUG: Loader: Injecting process 3976 (thread 2292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3976
2020-02-14 15:44:58,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3976
2020-02-14 15:44:58,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,265 [root] DEBUG: Loader: Injecting process 3976 (thread 2292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3976
2020-02-14 15:44:58,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2064
2020-02-14 15:44:58,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,280 [root] DEBUG: Loader: Injecting process 2064 (thread 2212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2064
2020-02-14 15:44:58,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2064
2020-02-14 15:44:58,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,312 [root] DEBUG: Loader: Injecting process 2064 (thread 2212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2064
2020-02-14 15:44:58,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4036
2020-02-14 15:44:58,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,328 [root] DEBUG: Loader: Injecting process 4036 (thread 2808) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4036
2020-02-14 15:44:58,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4036
2020-02-14 15:44:58,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,500 [root] DEBUG: Loader: Injecting process 4036 (thread 2808) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4036
2020-02-14 15:44:58,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4016
2020-02-14 15:44:58,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,640 [root] DEBUG: Loader: Injecting process 4016 (thread 1048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4016
2020-02-14 15:44:58,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4016
2020-02-14 15:44:58,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,671 [root] DEBUG: Loader: Injecting process 4016 (thread 1048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4016
2020-02-14 15:44:58,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 400
2020-02-14 15:44:58,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,687 [root] DEBUG: Loader: Injecting process 400 (thread 2224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 400
2020-02-14 15:44:58,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 400
2020-02-14 15:44:58,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,765 [root] DEBUG: Loader: Injecting process 400 (thread 2224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 400
2020-02-14 15:44:58,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2372
2020-02-14 15:44:58,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,796 [root] DEBUG: Loader: Injecting process 2372 (thread 552) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2372
2020-02-14 15:44:58,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2372
2020-02-14 15:44:58,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,828 [root] DEBUG: Loader: Injecting process 2372 (thread 552) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2372
2020-02-14 15:44:58,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 792
2020-02-14 15:44:58,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,842 [root] DEBUG: Loader: Injecting process 792 (thread 1384) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 792
2020-02-14 15:44:58,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 792
2020-02-14 15:44:58,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,875 [root] DEBUG: Loader: Injecting process 792 (thread 1384) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 792
2020-02-14 15:44:58,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1516
2020-02-14 15:44:58,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,890 [root] DEBUG: Loader: Injecting process 1516 (thread 2436) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1516
2020-02-14 15:44:58,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1516
2020-02-14 15:44:58,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,921 [root] DEBUG: Loader: Injecting process 1516 (thread 2436) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1516
2020-02-14 15:44:58,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2580
2020-02-14 15:44:58,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,953 [root] DEBUG: Loader: Injecting process 2580 (thread 2364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:58,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2580
2020-02-14 15:44:58,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2580
2020-02-14 15:44:58,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:58,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:58,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:58,983 [root] DEBUG: Loader: Injecting process 2580 (thread 2364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:58,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:58,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:58,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2580
2020-02-14 15:44:59,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3820
2020-02-14 15:44:59,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,000 [root] DEBUG: Loader: Injecting process 3820 (thread 2988) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3820
2020-02-14 15:44:59,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3820
2020-02-14 15:44:59,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,030 [root] DEBUG: Loader: Injecting process 3820 (thread 2988) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3820
2020-02-14 15:44:59,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3164
2020-02-14 15:44:59,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,046 [root] DEBUG: Loader: Injecting process 3164 (thread 2936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3164
2020-02-14 15:44:59,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3164
2020-02-14 15:44:59,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,078 [root] DEBUG: Loader: Injecting process 3164 (thread 2936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3164
2020-02-14 15:44:59,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3204
2020-02-14 15:44:59,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,140 [root] DEBUG: Loader: Injecting process 3204 (thread 2416) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3204
2020-02-14 15:44:59,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3204
2020-02-14 15:44:59,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,171 [root] DEBUG: Loader: Injecting process 3204 (thread 2416) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3204
2020-02-14 15:44:59,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3380
2020-02-14 15:44:59,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,187 [root] DEBUG: Loader: Injecting process 3380 (thread 3244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3380
2020-02-14 15:44:59,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3380
2020-02-14 15:44:59,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,250 [root] DEBUG: Loader: Injecting process 3380 (thread 3244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3380
2020-02-14 15:44:59,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3480
2020-02-14 15:44:59,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,296 [root] DEBUG: Loader: Injecting process 3480 (thread 3252) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3480
2020-02-14 15:44:59,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3480
2020-02-14 15:44:59,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,328 [root] DEBUG: Loader: Injecting process 3480 (thread 3252) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3480
2020-02-14 15:44:59,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3448
2020-02-14 15:44:59,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,390 [root] DEBUG: Loader: Injecting process 3448 (thread 3704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3448
2020-02-14 15:44:59,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3448
2020-02-14 15:44:59,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,405 [root] DEBUG: Loader: Injecting process 3448 (thread 3704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3448
2020-02-14 15:44:59,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3552
2020-02-14 15:44:59,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,453 [root] DEBUG: Loader: Injecting process 3552 (thread 3640) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3552
2020-02-14 15:44:59,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3552
2020-02-14 15:44:59,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,530 [root] DEBUG: Loader: Injecting process 3552 (thread 3640) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3552
2020-02-14 15:44:59,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3672
2020-02-14 15:44:59,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,546 [root] DEBUG: Loader: Injecting process 3672 (thread 3792) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3672
2020-02-14 15:44:59,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3672
2020-02-14 15:44:59,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,578 [root] DEBUG: Loader: Injecting process 3672 (thread 3792) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3672
2020-02-14 15:44:59,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3992
2020-02-14 15:44:59,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,592 [root] DEBUG: Loader: Injecting process 3992 (thread 3824) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3992
2020-02-14 15:44:59,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3992
2020-02-14 15:44:59,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,655 [root] DEBUG: Loader: Injecting process 3992 (thread 3824) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3992
2020-02-14 15:44:59,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4000
2020-02-14 15:44:59,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,671 [root] DEBUG: Loader: Injecting process 4000 (thread 1376) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4000
2020-02-14 15:44:59,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4000
2020-02-14 15:44:59,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,687 [root] DEBUG: Loader: Injecting process 4000 (thread 1376) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4000
2020-02-14 15:44:59,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1888
2020-02-14 15:44:59,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,717 [root] DEBUG: Loader: Injecting process 1888 (thread 2244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1888
2020-02-14 15:44:59,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1888
2020-02-14 15:44:59,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,750 [root] DEBUG: Loader: Injecting process 1888 (thread 2244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1888
2020-02-14 15:44:59,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2356
2020-02-14 15:44:59,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,765 [root] DEBUG: Loader: Injecting process 2356 (thread 1568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2356
2020-02-14 15:44:59,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2356
2020-02-14 15:44:59,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,796 [root] DEBUG: Loader: Injecting process 2356 (thread 1568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2356
2020-02-14 15:44:59,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1400
2020-02-14 15:44:59,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,812 [root] DEBUG: Loader: Injecting process 1400 (thread 1140) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1400
2020-02-14 15:44:59,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1400
2020-02-14 15:44:59,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,953 [root] DEBUG: Loader: Injecting process 1400 (thread 1140) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:44:59,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1400
2020-02-14 15:44:59,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2648
2020-02-14 15:44:59,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:44:59,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:44:59,967 [root] DEBUG: Loader: Injecting process 2648 (thread 876) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:44:59,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:44:59,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:44:59,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2648
2020-02-14 15:44:59,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2648
2020-02-14 15:44:59,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:44:59,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,000 [root] DEBUG: Loader: Injecting process 2648 (thread 876) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2648
2020-02-14 15:45:00,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2428
2020-02-14 15:45:00,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,015 [root] DEBUG: Loader: Injecting process 2428 (thread 2784) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2428
2020-02-14 15:45:00,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2428
2020-02-14 15:45:00,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,046 [root] DEBUG: Loader: Injecting process 2428 (thread 2784) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2428
2020-02-14 15:45:00,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 840
2020-02-14 15:45:00,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,171 [root] DEBUG: Loader: Injecting process 840 (thread 2712) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 840
2020-02-14 15:45:00,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 840
2020-02-14 15:45:00,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,203 [root] DEBUG: Loader: Injecting process 840 (thread 2712) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 840
2020-02-14 15:45:00,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2132
2020-02-14 15:45:00,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,233 [root] DEBUG: Loader: Injecting process 2132 (thread 2876) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2132
2020-02-14 15:45:00,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2132
2020-02-14 15:45:00,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,265 [root] DEBUG: Loader: Injecting process 2132 (thread 2876) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2132
2020-02-14 15:45:00,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3020
2020-02-14 15:45:00,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,280 [root] DEBUG: Loader: Injecting process 3020 (thread 3064) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3020
2020-02-14 15:45:00,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3020
2020-02-14 15:45:00,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,296 [root] DEBUG: Loader: Injecting process 3020 (thread 3064) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3020
2020-02-14 15:45:00,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3476
2020-02-14 15:45:00,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,328 [root] DEBUG: Loader: Injecting process 3476 (thread 3316) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3476
2020-02-14 15:45:00,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3476
2020-02-14 15:45:00,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,358 [root] DEBUG: Loader: Injecting process 3476 (thread 3316) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3476
2020-02-14 15:45:00,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3420
2020-02-14 15:45:00,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,375 [root] DEBUG: Loader: Injecting process 3420 (thread 3372) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3420
2020-02-14 15:45:00,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3420
2020-02-14 15:45:00,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,390 [root] DEBUG: Loader: Injecting process 3420 (thread 3372) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3420
2020-02-14 15:45:00,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3724
2020-02-14 15:45:00,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,421 [root] DEBUG: Loader: Injecting process 3724 (thread 3496) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3724
2020-02-14 15:45:00,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3724
2020-02-14 15:45:00,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,453 [root] DEBUG: Loader: Injecting process 3724 (thread 3496) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3724
2020-02-14 15:45:00,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3632
2020-02-14 15:45:00,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,467 [root] DEBUG: Loader: Injecting process 3632 (thread 3664) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:00,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3632
2020-02-14 15:45:00,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3632
2020-02-14 15:45:00,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:00,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:00,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:00,500 [root] DEBUG: Loader: Injecting process 3632 (thread 3664) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:00,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:00,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:00,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3632
2020-02-14 15:45:00,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3996
2020-02-14 15:45:01,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:01,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:01,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:01,405 [root] DEBUG: Loader: Injecting process 3996 (thread 604) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:01,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:01,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:01,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:01,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:01,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3996
2020-02-14 15:45:01,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3996
2020-02-14 15:45:01,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:01,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:01,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:01,437 [root] DEBUG: Loader: Injecting process 3996 (thread 604) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:01,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:01,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:01,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:01,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:01,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3996
2020-02-14 15:45:01,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1204
2020-02-14 15:45:01,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:01,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:01,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,015 [root] DEBUG: Loader: Injecting process 1204 (thread 2792) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1204
2020-02-14 15:45:02,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1204
2020-02-14 15:45:02,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,046 [root] DEBUG: Loader: Injecting process 1204 (thread 2792) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1204
2020-02-14 15:45:02,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1632
2020-02-14 15:45:02,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,078 [root] DEBUG: Loader: Injecting process 1632 (thread 1596) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1632
2020-02-14 15:45:02,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1632
2020-02-14 15:45:02,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,125 [root] DEBUG: Loader: Injecting process 1632 (thread 1596) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1632
2020-02-14 15:45:02,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1144
2020-02-14 15:45:02,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,140 [root] DEBUG: Loader: Injecting process 1144 (thread 1880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1144
2020-02-14 15:45:02,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1144
2020-02-14 15:45:02,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,171 [root] DEBUG: Loader: Injecting process 1144 (thread 1880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1144
2020-02-14 15:45:02,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 548
2020-02-14 15:45:02,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,187 [root] DEBUG: Loader: Injecting process 548 (thread 704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 548
2020-02-14 15:45:02,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 548
2020-02-14 15:45:02,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,217 [root] DEBUG: Loader: Injecting process 548 (thread 704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 548
2020-02-14 15:45:02,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2148
2020-02-14 15:45:02,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,233 [root] DEBUG: Loader: Injecting process 2148 (thread 1156) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2148
2020-02-14 15:45:02,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2148
2020-02-14 15:45:02,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,265 [root] DEBUG: Loader: Injecting process 2148 (thread 1156) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2148
2020-02-14 15:45:02,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4008
2020-02-14 15:45:02,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,328 [root] DEBUG: Loader: Injecting process 4008 (thread 2576) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4008
2020-02-14 15:45:02,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4008
2020-02-14 15:45:02,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,342 [root] DEBUG: Loader: Injecting process 4008 (thread 2576) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4008
2020-02-14 15:45:02,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4040
2020-02-14 15:45:02,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,390 [root] DEBUG: Loader: Injecting process 4040 (thread 2864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4040
2020-02-14 15:45:02,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4040
2020-02-14 15:45:02,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,437 [root] DEBUG: Loader: Injecting process 4040 (thread 2864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4040
2020-02-14 15:45:02,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3276
2020-02-14 15:45:02,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,453 [root] DEBUG: Loader: Injecting process 3276 (thread 3336) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3276
2020-02-14 15:45:02,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3276
2020-02-14 15:45:02,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,467 [root] DEBUG: Loader: Injecting process 3276 (thread 3336) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3276
2020-02-14 15:45:02,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2240
2020-02-14 15:45:02,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,500 [root] DEBUG: Loader: Injecting process 2240 (thread 3160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2240
2020-02-14 15:45:02,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2240
2020-02-14 15:45:02,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,515 [root] DEBUG: Loader: Injecting process 2240 (thread 3160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2240
2020-02-14 15:45:02,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3720
2020-02-14 15:45:02,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,562 [root] DEBUG: Loader: Injecting process 3720 (thread 3332) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3720
2020-02-14 15:45:02,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3720
2020-02-14 15:45:02,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,592 [root] DEBUG: Loader: Injecting process 3720 (thread 3332) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3720
2020-02-14 15:45:02,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3952
2020-02-14 15:45:02,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,625 [root] DEBUG: Loader: Injecting process 3952 (thread 3892) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3952
2020-02-14 15:45:02,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3952
2020-02-14 15:45:02,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,655 [root] DEBUG: Loader: Injecting process 3952 (thread 3892) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3952
2020-02-14 15:45:02,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 904
2020-02-14 15:45:02,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,671 [root] DEBUG: Loader: Injecting process 904 (thread 1592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 904
2020-02-14 15:45:02,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 904
2020-02-14 15:45:02,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,687 [root] DEBUG: Loader: Injecting process 904 (thread 1592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 904
2020-02-14 15:45:02,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2208
2020-02-14 15:45:02,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,750 [root] DEBUG: Loader: Injecting process 2208 (thread 3920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2208
2020-02-14 15:45:02,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2208
2020-02-14 15:45:02,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,780 [root] DEBUG: Loader: Injecting process 2208 (thread 3920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2208
2020-02-14 15:45:02,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 632
2020-02-14 15:45:02,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,812 [root] DEBUG: Loader: Injecting process 632 (thread 936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 632
2020-02-14 15:45:02,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 632
2020-02-14 15:45:02,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,842 [root] DEBUG: Loader: Injecting process 632 (thread 936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 632
2020-02-14 15:45:02,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3784
2020-02-14 15:45:02,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,858 [root] DEBUG: Loader: Injecting process 3784 (thread 820) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:02,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3784
2020-02-14 15:45:02,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3784
2020-02-14 15:45:02,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:02,921 [root] DEBUG: Loader: Injecting process 3784 (thread 820) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:02,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:02,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:02,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3784
2020-02-14 15:45:02,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1412
2020-02-14 15:45:02,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:02,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:02,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,000 [root] DEBUG: Loader: Injecting process 1412 (thread 2600) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1412
2020-02-14 15:45:03,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1412
2020-02-14 15:45:03,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,203 [root] DEBUG: Loader: Injecting process 1412 (thread 2600) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1412
2020-02-14 15:45:03,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2932
2020-02-14 15:45:03,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,233 [root] DEBUG: Loader: Injecting process 2932 (thread 2628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2932
2020-02-14 15:45:03,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2932
2020-02-14 15:45:03,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,265 [root] DEBUG: Loader: Injecting process 2932 (thread 2628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2932
2020-02-14 15:45:03,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2768
2020-02-14 15:45:03,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,280 [root] DEBUG: Loader: Injecting process 2768 (thread 3148) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2768
2020-02-14 15:45:03,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2768
2020-02-14 15:45:03,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,328 [root] DEBUG: Loader: Injecting process 2768 (thread 3148) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2768
2020-02-14 15:45:03,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3296
2020-02-14 15:45:03,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,358 [root] DEBUG: Loader: Injecting process 3296 (thread 3300) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3296
2020-02-14 15:45:03,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3296
2020-02-14 15:45:03,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,390 [root] DEBUG: Loader: Injecting process 3296 (thread 3300) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3296
2020-02-14 15:45:03,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3452
2020-02-14 15:45:03,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,405 [root] DEBUG: Loader: Injecting process 3452 (thread 3680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3452
2020-02-14 15:45:03,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3452
2020-02-14 15:45:03,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,421 [root] DEBUG: Loader: Injecting process 3452 (thread 3680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3452
2020-02-14 15:45:03,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3852
2020-02-14 15:45:03,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,453 [root] DEBUG: Loader: Injecting process 3852 (thread 3856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3852
2020-02-14 15:45:03,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3852
2020-02-14 15:45:03,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,467 [root] DEBUG: Loader: Injecting process 3852 (thread 3856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3852
2020-02-14 15:45:03,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2028
2020-02-14 15:45:03,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,500 [root] DEBUG: Loader: Injecting process 2028 (thread 3980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2028
2020-02-14 15:45:03,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2028
2020-02-14 15:45:03,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,515 [root] DEBUG: Loader: Injecting process 2028 (thread 3980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2028
2020-02-14 15:45:03,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2376
2020-02-14 15:45:03,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,546 [root] DEBUG: Loader: Injecting process 2376 (thread 2108) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2376
2020-02-14 15:45:03,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2376
2020-02-14 15:45:03,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,578 [root] DEBUG: Loader: Injecting process 2376 (thread 2108) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2376
2020-02-14 15:45:03,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3988
2020-02-14 15:45:03,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,592 [root] DEBUG: Loader: Injecting process 3988 (thread 284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-02-14 15:45:03,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3988
2020-02-14 15:45:03,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,625 [root] DEBUG: Loader: Injecting process 3988 (thread 284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-02-14 15:45:03,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2400
2020-02-14 15:45:03,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,640 [root] DEBUG: Loader: Injecting process 2400 (thread 3320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2400
2020-02-14 15:45:03,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2400
2020-02-14 15:45:03,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,671 [root] DEBUG: Loader: Injecting process 2400 (thread 3320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2400
2020-02-14 15:45:03,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3056
2020-02-14 15:45:03,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,687 [root] DEBUG: Loader: Injecting process 3056 (thread 3084) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3056
2020-02-14 15:45:03,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3056
2020-02-14 15:45:03,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,717 [root] DEBUG: Loader: Injecting process 3056 (thread 3084) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3056
2020-02-14 15:45:03,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3232
2020-02-14 15:45:03,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,733 [root] DEBUG: Loader: Injecting process 3232 (thread 3176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3232
2020-02-14 15:45:03,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3232
2020-02-14 15:45:03,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,765 [root] DEBUG: Loader: Injecting process 3232 (thread 3176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3232
2020-02-14 15:45:03,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3208
2020-02-14 15:45:03,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,796 [root] DEBUG: Loader: Injecting process 3208 (thread 3472) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3208
2020-02-14 15:45:03,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3208
2020-02-14 15:45:03,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,828 [root] DEBUG: Loader: Injecting process 3208 (thread 3472) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3208
2020-02-14 15:45:03,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3644
2020-02-14 15:45:03,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,842 [root] DEBUG: Loader: Injecting process 3644 (thread 3808) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3644
2020-02-14 15:45:03,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3644
2020-02-14 15:45:03,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,875 [root] DEBUG: Loader: Injecting process 3644 (thread 3808) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3644
2020-02-14 15:45:03,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3884
2020-02-14 15:45:03,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,890 [root] DEBUG: Loader: Injecting process 3884 (thread 540) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3884
2020-02-14 15:45:03,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3884
2020-02-14 15:45:03,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,905 [root] DEBUG: Loader: Injecting process 3884 (thread 540) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3884
2020-02-14 15:45:03,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3116
2020-02-14 15:45:03,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,937 [root] DEBUG: Loader: Injecting process 3116 (thread 2100) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:03,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3116
2020-02-14 15:45:03,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3116
2020-02-14 15:45:03,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,953 [root] DEBUG: Loader: Injecting process 3116 (thread 2100) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:03,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3116
2020-02-14 15:45:03,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3576
2020-02-14 15:45:03,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:03,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:03,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:03,983 [root] DEBUG: Loader: Injecting process 3576 (thread 796) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:03,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:03,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-02-14 15:45:04,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3576
2020-02-14 15:45:04,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,030 [root] DEBUG: Loader: Injecting process 3576 (thread 796) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-02-14 15:45:04,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2868
2020-02-14 15:45:04,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,046 [root] DEBUG: Loader: Injecting process 2868 (thread 2920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2868
2020-02-14 15:45:04,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2868
2020-02-14 15:45:04,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,092 [root] DEBUG: Loader: Injecting process 2868 (thread 2920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2868
2020-02-14 15:45:04,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2976
2020-02-14 15:45:04,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,171 [root] DEBUG: Loader: Injecting process 2976 (thread 3100) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2976
2020-02-14 15:45:04,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2976
2020-02-14 15:45:04,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,217 [root] DEBUG: Loader: Injecting process 2976 (thread 3100) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2976
2020-02-14 15:45:04,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3504
2020-02-14 15:45:04,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,250 [root] DEBUG: Loader: Injecting process 3504 (thread 3364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3504
2020-02-14 15:45:04,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3504
2020-02-14 15:45:04,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,280 [root] DEBUG: Loader: Injecting process 3504 (thread 3364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3504
2020-02-14 15:45:04,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4004
2020-02-14 15:45:04,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,328 [root] DEBUG: Loader: Injecting process 4004 (thread 3908) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-02-14 15:45:04,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4004
2020-02-14 15:45:04,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,342 [root] DEBUG: Loader: Injecting process 4004 (thread 3908) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-02-14 15:45:04,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4072
2020-02-14 15:45:04,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,375 [root] DEBUG: Loader: Injecting process 4072 (thread 920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4072
2020-02-14 15:45:04,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4072
2020-02-14 15:45:04,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,405 [root] DEBUG: Loader: Injecting process 4072 (thread 920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4072
2020-02-14 15:45:04,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2280
2020-02-14 15:45:04,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,437 [root] DEBUG: Loader: Injecting process 2280 (thread 1232) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2280
2020-02-14 15:45:04,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2280
2020-02-14 15:45:04,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,467 [root] DEBUG: Loader: Injecting process 2280 (thread 1232) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2280
2020-02-14 15:45:04,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2392
2020-02-14 15:45:04,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,483 [root] DEBUG: Loader: Injecting process 2392 (thread 2860) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2392
2020-02-14 15:45:04,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2392
2020-02-14 15:45:04,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,515 [root] DEBUG: Loader: Injecting process 2392 (thread 2860) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2392
2020-02-14 15:45:04,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3192
2020-02-14 15:45:04,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,530 [root] DEBUG: Loader: Injecting process 3192 (thread 2944) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3192
2020-02-14 15:45:04,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3192
2020-02-14 15:45:04,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,562 [root] DEBUG: Loader: Injecting process 3192 (thread 2944) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3192
2020-02-14 15:45:04,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3428
2020-02-14 15:45:04,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,592 [root] DEBUG: Loader: Injecting process 3428 (thread 3836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3428
2020-02-14 15:45:04,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3428
2020-02-14 15:45:04,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,625 [root] DEBUG: Loader: Injecting process 3428 (thread 3836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3428
2020-02-14 15:45:04,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 256
2020-02-14 15:45:04,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,640 [root] DEBUG: Loader: Injecting process 256 (thread 3264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 256
2020-02-14 15:45:04,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 256
2020-02-14 15:45:04,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,671 [root] DEBUG: Loader: Injecting process 256 (thread 3264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 256
2020-02-14 15:45:04,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1600
2020-02-14 15:45:04,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,687 [root] DEBUG: Loader: Injecting process 1600 (thread 2884) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1600
2020-02-14 15:45:04,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1600
2020-02-14 15:45:04,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,717 [root] DEBUG: Loader: Injecting process 1600 (thread 2884) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1600
2020-02-14 15:45:04,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2424
2020-02-14 15:45:04,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,733 [root] DEBUG: Loader: Injecting process 2424 (thread 896) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2424
2020-02-14 15:45:04,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2424
2020-02-14 15:45:04,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,765 [root] DEBUG: Loader: Injecting process 2424 (thread 896) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2424
2020-02-14 15:45:04,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3024
2020-02-14 15:45:04,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,780 [root] DEBUG: Loader: Injecting process 3024 (thread 1228) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3024
2020-02-14 15:45:04,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3024
2020-02-14 15:45:04,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,812 [root] DEBUG: Loader: Injecting process 3024 (thread 1228) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3024
2020-02-14 15:45:04,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3260
2020-02-14 15:45:04,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,828 [root] DEBUG: Loader: Injecting process 3260 (thread 3508) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3260
2020-02-14 15:45:04,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3260
2020-02-14 15:45:04,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,858 [root] DEBUG: Loader: Injecting process 3260 (thread 3508) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3260
2020-02-14 15:45:04,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3936
2020-02-14 15:45:04,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,890 [root] DEBUG: Loader: Injecting process 3936 (thread 3564) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3936
2020-02-14 15:45:04,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3936
2020-02-14 15:45:04,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,921 [root] DEBUG: Loader: Injecting process 3936 (thread 3564) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3936
2020-02-14 15:45:04,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2996
2020-02-14 15:45:04,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,937 [root] DEBUG: Loader: Injecting process 2996 (thread 1952) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2996
2020-02-14 15:45:04,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2996
2020-02-14 15:45:04,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,967 [root] DEBUG: Loader: Injecting process 2996 (thread 1952) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:04,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2996
2020-02-14 15:45:04,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2500
2020-02-14 15:45:04,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:04,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:04,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:04,983 [root] DEBUG: Loader: Injecting process 2500 (thread 3048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:04,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:04,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:04,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2500
2020-02-14 15:45:05,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2500
2020-02-14 15:45:05,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,015 [root] DEBUG: Loader: Injecting process 2500 (thread 3048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2500
2020-02-14 15:45:05,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3324
2020-02-14 15:45:05,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,030 [root] DEBUG: Loader: Injecting process 3324 (thread 3216) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3324
2020-02-14 15:45:05,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3324
2020-02-14 15:45:05,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,062 [root] DEBUG: Loader: Injecting process 3324 (thread 3216) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3324
2020-02-14 15:45:05,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2992
2020-02-14 15:45:05,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,078 [root] DEBUG: Loader: Injecting process 2992 (thread 528) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2992
2020-02-14 15:45:05,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2992
2020-02-14 15:45:05,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,108 [root] DEBUG: Loader: Injecting process 2992 (thread 528) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2992
2020-02-14 15:45:05,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2660
2020-02-14 15:45:05,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,125 [root] DEBUG: Loader: Injecting process 2660 (thread 2836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2660
2020-02-14 15:45:05,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2660
2020-02-14 15:45:05,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,155 [root] DEBUG: Loader: Injecting process 2660 (thread 2836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2660
2020-02-14 15:45:05,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3180
2020-02-14 15:45:05,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,171 [root] DEBUG: Loader: Injecting process 3180 (thread 3344) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3180
2020-02-14 15:45:05,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3180
2020-02-14 15:45:05,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,203 [root] DEBUG: Loader: Injecting process 3180 (thread 3344) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3180
2020-02-14 15:45:05,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3748
2020-02-14 15:45:05,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,328 [root] DEBUG: Loader: Injecting process 3748 (thread 3960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-02-14 15:45:05,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3748
2020-02-14 15:45:05,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,358 [root] DEBUG: Loader: Injecting process 3748 (thread 3960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-02-14 15:45:05,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2312
2020-02-14 15:45:05,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,375 [root] DEBUG: Loader: Injecting process 2312 (thread 2520) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2312
2020-02-14 15:45:05,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2312
2020-02-14 15:45:05,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,405 [root] DEBUG: Loader: Injecting process 2312 (thread 2520) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2312
2020-02-14 15:45:05,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3152
2020-02-14 15:45:05,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,421 [root] DEBUG: Loader: Injecting process 3152 (thread 3136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3152
2020-02-14 15:45:05,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3152
2020-02-14 15:45:05,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,453 [root] DEBUG: Loader: Injecting process 3152 (thread 3136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3152
2020-02-14 15:45:05,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3832
2020-02-14 15:45:05,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,467 [root] DEBUG: Loader: Injecting process 3832 (thread 3880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3832
2020-02-14 15:45:05,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3832
2020-02-14 15:45:05,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,500 [root] DEBUG: Loader: Injecting process 3832 (thread 3880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3832
2020-02-14 15:45:05,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3044
2020-02-14 15:45:05,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,515 [root] DEBUG: Loader: Injecting process 3044 (thread 2960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3044
2020-02-14 15:45:05,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3044
2020-02-14 15:45:05,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,546 [root] DEBUG: Loader: Injecting process 3044 (thread 2960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3044
2020-02-14 15:45:05,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1628
2020-02-14 15:45:05,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,562 [root] DEBUG: Loader: Injecting process 1628 (thread 3292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1628
2020-02-14 15:45:05,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1628
2020-02-14 15:45:05,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,592 [root] DEBUG: Loader: Injecting process 1628 (thread 3292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1628
2020-02-14 15:45:05,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2484
2020-02-14 15:45:05,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,625 [root] DEBUG: Loader: Injecting process 2484 (thread 2984) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2484
2020-02-14 15:45:05,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2484
2020-02-14 15:45:05,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,640 [root] DEBUG: Loader: Injecting process 2484 (thread 2984) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2484
2020-02-14 15:45:05,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2116
2020-02-14 15:45:05,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,671 [root] DEBUG: Loader: Injecting process 2116 (thread 2300) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2116
2020-02-14 15:45:05,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2116
2020-02-14 15:45:05,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,703 [root] DEBUG: Loader: Injecting process 2116 (thread 2300) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2116
2020-02-14 15:45:05,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1460
2020-02-14 15:45:05,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,717 [root] DEBUG: Loader: Injecting process 1460 (thread 3128) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1460
2020-02-14 15:45:05,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1460
2020-02-14 15:45:05,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,750 [root] DEBUG: Loader: Injecting process 1460 (thread 3128) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1460
2020-02-14 15:45:05,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2664
2020-02-14 15:45:05,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,765 [root] DEBUG: Loader: Injecting process 2664 (thread 932) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2664
2020-02-14 15:45:05,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2664
2020-02-14 15:45:05,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,796 [root] DEBUG: Loader: Injecting process 2664 (thread 932) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2664
2020-02-14 15:45:05,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3868
2020-02-14 15:45:05,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,842 [root] DEBUG: Loader: Injecting process 3868 (thread 164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3868
2020-02-14 15:45:05,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3868
2020-02-14 15:45:05,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,875 [root] DEBUG: Loader: Injecting process 3868 (thread 164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3868
2020-02-14 15:45:05,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 992
2020-02-14 15:45:05,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,890 [root] DEBUG: Loader: Injecting process 992 (thread 884) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 992
2020-02-14 15:45:05,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 992
2020-02-14 15:45:05,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,921 [root] DEBUG: Loader: Injecting process 992 (thread 884) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 992
2020-02-14 15:45:05,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2384
2020-02-14 15:45:05,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,937 [root] DEBUG: Loader: Injecting process 2384 (thread 2492) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:05,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2384
2020-02-14 15:45:05,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2384
2020-02-14 15:45:05,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:05,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:05,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:05,967 [root] DEBUG: Loader: Injecting process 2384 (thread 2492) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:05,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:05,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:05,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2384
2020-02-14 15:45:05,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2588
2020-02-14 15:45:06,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,000 [root] DEBUG: Loader: Injecting process 2588 (thread 3612) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-02-14 15:45:06,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2588
2020-02-14 15:45:06,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,030 [root] DEBUG: Loader: Injecting process 2588 (thread 3612) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-02-14 15:45:06,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3132
2020-02-14 15:45:06,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,046 [root] DEBUG: Loader: Injecting process 3132 (thread 996) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3132
2020-02-14 15:45:06,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3132
2020-02-14 15:45:06,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,078 [root] DEBUG: Loader: Injecting process 3132 (thread 996) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3132
2020-02-14 15:45:06,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2340
2020-02-14 15:45:06,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,092 [root] DEBUG: Loader: Injecting process 2340 (thread 3624) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2340
2020-02-14 15:45:06,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2340
2020-02-14 15:45:06,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,125 [root] DEBUG: Loader: Injecting process 2340 (thread 3624) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2340
2020-02-14 15:45:06,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4172
2020-02-14 15:45:06,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,140 [root] DEBUG: Loader: Injecting process 4172 (thread 4176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4172
2020-02-14 15:45:06,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4172
2020-02-14 15:45:06,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,171 [root] DEBUG: Loader: Injecting process 4172 (thread 4176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4172
2020-02-14 15:45:06,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4268
2020-02-14 15:45:06,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,187 [root] DEBUG: Loader: Injecting process 4268 (thread 4272) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4268
2020-02-14 15:45:06,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4268
2020-02-14 15:45:06,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,217 [root] DEBUG: Loader: Injecting process 4268 (thread 4272) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4268
2020-02-14 15:45:06,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4364
2020-02-14 15:45:06,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,233 [root] DEBUG: Loader: Injecting process 4364 (thread 4368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4364
2020-02-14 15:45:06,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4364
2020-02-14 15:45:06,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,250 [root] DEBUG: Loader: Injecting process 4364 (thread 4368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4364
2020-02-14 15:45:06,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4460
2020-02-14 15:45:06,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,280 [root] DEBUG: Loader: Injecting process 4460 (thread 4464) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4460
2020-02-14 15:45:06,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4460
2020-02-14 15:45:06,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,312 [root] DEBUG: Loader: Injecting process 4460 (thread 4464) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4460
2020-02-14 15:45:06,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4556
2020-02-14 15:45:06,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,342 [root] DEBUG: Loader: Injecting process 4556 (thread 4560) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4556
2020-02-14 15:45:06,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4556
2020-02-14 15:45:06,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,375 [root] DEBUG: Loader: Injecting process 4556 (thread 4560) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4556
2020-02-14 15:45:06,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4652
2020-02-14 15:45:06,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,390 [root] DEBUG: Loader: Injecting process 4652 (thread 4656) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4652
2020-02-14 15:45:06,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4652
2020-02-14 15:45:06,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,421 [root] DEBUG: Loader: Injecting process 4652 (thread 4656) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4652
2020-02-14 15:45:06,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4748
2020-02-14 15:45:06,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,437 [root] DEBUG: Loader: Injecting process 4748 (thread 4752) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4748
2020-02-14 15:45:06,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4748
2020-02-14 15:45:06,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,467 [root] DEBUG: Loader: Injecting process 4748 (thread 4752) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4748
2020-02-14 15:45:06,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4844
2020-02-14 15:45:06,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,483 [root] DEBUG: Loader: Injecting process 4844 (thread 4848) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4844
2020-02-14 15:45:06,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4844
2020-02-14 15:45:06,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,515 [root] DEBUG: Loader: Injecting process 4844 (thread 4848) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4844
2020-02-14 15:45:06,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4940
2020-02-14 15:45:06,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,530 [root] DEBUG: Loader: Injecting process 4940 (thread 4944) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4940
2020-02-14 15:45:06,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4940
2020-02-14 15:45:06,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,562 [root] DEBUG: Loader: Injecting process 4940 (thread 4944) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4940
2020-02-14 15:45:06,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5036
2020-02-14 15:45:06,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,578 [root] DEBUG: Loader: Injecting process 5036 (thread 5040) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5036
2020-02-14 15:45:06,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5036
2020-02-14 15:45:06,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,608 [root] DEBUG: Loader: Injecting process 5036 (thread 5040) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5036
2020-02-14 15:45:06,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5132
2020-02-14 15:45:06,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,625 [root] DEBUG: Loader: Injecting process 5132 (thread 5136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5132
2020-02-14 15:45:06,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5132
2020-02-14 15:45:06,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,655 [root] DEBUG: Loader: Injecting process 5132 (thread 5136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5132
2020-02-14 15:45:06,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5228
2020-02-14 15:45:06,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,671 [root] DEBUG: Loader: Injecting process 5228 (thread 5232) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5228
2020-02-14 15:45:06,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5228
2020-02-14 15:45:06,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,687 [root] DEBUG: Loader: Injecting process 5228 (thread 5232) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5228
2020-02-14 15:45:06,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5324
2020-02-14 15:45:06,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,717 [root] DEBUG: Loader: Injecting process 5324 (thread 5328) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5324
2020-02-14 15:45:06,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5324
2020-02-14 15:45:06,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,750 [root] DEBUG: Loader: Injecting process 5324 (thread 5328) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5324
2020-02-14 15:45:06,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5452
2020-02-14 15:45:06,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,765 [root] DEBUG: Loader: Injecting process 5452 (thread 5456) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5452
2020-02-14 15:45:06,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5452
2020-02-14 15:45:06,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,796 [root] DEBUG: Loader: Injecting process 5452 (thread 5456) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5452
2020-02-14 15:45:06,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5552
2020-02-14 15:45:06,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,812 [root] DEBUG: Loader: Injecting process 5552 (thread 5556) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5552
2020-02-14 15:45:06,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5552
2020-02-14 15:45:06,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,842 [root] DEBUG: Loader: Injecting process 5552 (thread 5556) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5552
2020-02-14 15:45:06,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5652
2020-02-14 15:45:06,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,858 [root] DEBUG: Loader: Injecting process 5652 (thread 5656) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5652
2020-02-14 15:45:06,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5652
2020-02-14 15:45:06,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,875 [root] DEBUG: Loader: Injecting process 5652 (thread 5656) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5652
2020-02-14 15:45:06,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5756
2020-02-14 15:45:06,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,905 [root] DEBUG: Loader: Injecting process 5756 (thread 5760) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:06,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5756
2020-02-14 15:45:06,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5756
2020-02-14 15:45:06,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:06,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:06,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:06,937 [root] DEBUG: Loader: Injecting process 5756 (thread 5760) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:06,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:06,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:06,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5756
2020-02-14 15:45:06,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5852
2020-02-14 15:45:07,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,000 [root] DEBUG: Loader: Injecting process 5852 (thread 5856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5852
2020-02-14 15:45:07,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5852
2020-02-14 15:45:07,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,015 [root] DEBUG: Loader: Injecting process 5852 (thread 5856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5852
2020-02-14 15:45:07,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5948
2020-02-14 15:45:07,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,046 [root] DEBUG: Loader: Injecting process 5948 (thread 5952) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5948
2020-02-14 15:45:07,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5948
2020-02-14 15:45:07,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,078 [root] DEBUG: Loader: Injecting process 5948 (thread 5952) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5948
2020-02-14 15:45:07,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6044
2020-02-14 15:45:07,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,092 [root] DEBUG: Loader: Injecting process 6044 (thread 6048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6044
2020-02-14 15:45:07,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6044
2020-02-14 15:45:07,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,125 [root] DEBUG: Loader: Injecting process 6044 (thread 6048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6044
2020-02-14 15:45:07,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6140
2020-02-14 15:45:07,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,140 [root] DEBUG: Loader: Injecting process 6140 (thread 4104) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6140
2020-02-14 15:45:07,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6140
2020-02-14 15:45:07,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,187 [root] DEBUG: Loader: Injecting process 6140 (thread 4104) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6140
2020-02-14 15:45:07,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4212
2020-02-14 15:45:07,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,203 [root] DEBUG: Loader: Injecting process 4212 (thread 4216) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4212
2020-02-14 15:45:07,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4212
2020-02-14 15:45:07,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,217 [root] DEBUG: Loader: Injecting process 4212 (thread 4216) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4212
2020-02-14 15:45:07,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4284
2020-02-14 15:45:07,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,342 [root] DEBUG: Loader: Injecting process 4284 (thread 4316) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4284
2020-02-14 15:45:07,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4284
2020-02-14 15:45:07,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,390 [root] DEBUG: Loader: Injecting process 4284 (thread 4316) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4284
2020-02-14 15:45:07,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4440
2020-02-14 15:45:07,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,405 [root] DEBUG: Loader: Injecting process 4440 (thread 4444) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4440
2020-02-14 15:45:07,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4440
2020-02-14 15:45:07,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,437 [root] DEBUG: Loader: Injecting process 4440 (thread 4444) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4440
2020-02-14 15:45:07,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4524
2020-02-14 15:45:07,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,453 [root] DEBUG: Loader: Injecting process 4524 (thread 4512) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4524
2020-02-14 15:45:07,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4524
2020-02-14 15:45:07,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,483 [root] DEBUG: Loader: Injecting process 4524 (thread 4512) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4524
2020-02-14 15:45:07,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4648
2020-02-14 15:45:07,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,500 [root] DEBUG: Loader: Injecting process 4648 (thread 4680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4648
2020-02-14 15:45:07,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4648
2020-02-14 15:45:07,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,515 [root] DEBUG: Loader: Injecting process 4648 (thread 4680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4648
2020-02-14 15:45:07,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4788
2020-02-14 15:45:07,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,546 [root] DEBUG: Loader: Injecting process 4788 (thread 4792) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4788
2020-02-14 15:45:07,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4788
2020-02-14 15:45:07,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,578 [root] DEBUG: Loader: Injecting process 4788 (thread 4792) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4788
2020-02-14 15:45:07,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4860
2020-02-14 15:45:07,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,592 [root] DEBUG: Loader: Injecting process 4860 (thread 4892) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4860
2020-02-14 15:45:07,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4860
2020-02-14 15:45:07,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,625 [root] DEBUG: Loader: Injecting process 4860 (thread 4892) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4860
2020-02-14 15:45:07,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5016
2020-02-14 15:45:07,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,640 [root] DEBUG: Loader: Injecting process 5016 (thread 5020) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5016
2020-02-14 15:45:07,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5016
2020-02-14 15:45:07,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,655 [root] DEBUG: Loader: Injecting process 5016 (thread 5020) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5016
2020-02-14 15:45:07,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5100
2020-02-14 15:45:07,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,687 [root] DEBUG: Loader: Injecting process 5100 (thread 5088) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5100
2020-02-14 15:45:07,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5100
2020-02-14 15:45:07,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,717 [root] DEBUG: Loader: Injecting process 5100 (thread 5088) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5100
2020-02-14 15:45:07,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5224
2020-02-14 15:45:07,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,733 [root] DEBUG: Loader: Injecting process 5224 (thread 5256) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5224
2020-02-14 15:45:07,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5224
2020-02-14 15:45:07,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,750 [root] DEBUG: Loader: Injecting process 5224 (thread 5256) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5224
2020-02-14 15:45:07,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5364
2020-02-14 15:45:07,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,780 [root] DEBUG: Loader: Injecting process 5364 (thread 5368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5364
2020-02-14 15:45:07,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5364
2020-02-14 15:45:07,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,796 [root] DEBUG: Loader: Injecting process 5364 (thread 5368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5364
2020-02-14 15:45:07,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5468
2020-02-14 15:45:07,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,828 [root] DEBUG: Loader: Injecting process 5468 (thread 5500) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5468
2020-02-14 15:45:07,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5468
2020-02-14 15:45:07,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,858 [root] DEBUG: Loader: Injecting process 5468 (thread 5500) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5468
2020-02-14 15:45:07,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5628
2020-02-14 15:45:07,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,953 [root] DEBUG: Loader: Injecting process 5628 (thread 5632) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:07,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5628
2020-02-14 15:45:07,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5628
2020-02-14 15:45:07,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:07,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:07,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:07,967 [root] DEBUG: Loader: Injecting process 5628 (thread 5632) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:07,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:07,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:07,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5628
2020-02-14 15:45:08,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5716
2020-02-14 15:45:08,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,062 [root] DEBUG: Loader: Injecting process 5716 (thread 5704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5716
2020-02-14 15:45:08,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5716
2020-02-14 15:45:08,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,125 [root] DEBUG: Loader: Injecting process 5716 (thread 5704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5716
2020-02-14 15:45:08,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5848
2020-02-14 15:45:08,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,187 [root] DEBUG: Loader: Injecting process 5848 (thread 5880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5848
2020-02-14 15:45:08,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5848
2020-02-14 15:45:08,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,203 [root] DEBUG: Loader: Injecting process 5848 (thread 5880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5848
2020-02-14 15:45:08,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5988
2020-02-14 15:45:08,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,217 [root] DEBUG: Loader: Injecting process 5988 (thread 5992) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5988
2020-02-14 15:45:08,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5988
2020-02-14 15:45:08,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,250 [root] DEBUG: Loader: Injecting process 5988 (thread 5992) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5988
2020-02-14 15:45:08,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6060
2020-02-14 15:45:08,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,265 [root] DEBUG: Loader: Injecting process 6060 (thread 6092) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6060
2020-02-14 15:45:08,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6060
2020-02-14 15:45:08,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,296 [root] DEBUG: Loader: Injecting process 6060 (thread 6092) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6060
2020-02-14 15:45:08,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4164
2020-02-14 15:45:08,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,312 [root] DEBUG: Loader: Injecting process 4164 (thread 4168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4164
2020-02-14 15:45:08,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4164
2020-02-14 15:45:08,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,405 [root] DEBUG: Loader: Injecting process 4164 (thread 4168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4164
2020-02-14 15:45:08,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4264
2020-02-14 15:45:08,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,437 [root] DEBUG: Loader: Injecting process 4264 (thread 4224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4264
2020-02-14 15:45:08,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4264
2020-02-14 15:45:08,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,483 [root] DEBUG: Loader: Injecting process 4264 (thread 4224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4264
2020-02-14 15:45:08,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4416
2020-02-14 15:45:08,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,500 [root] DEBUG: Loader: Injecting process 4416 (thread 4420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4416
2020-02-14 15:45:08,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4416
2020-02-14 15:45:08,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,530 [root] DEBUG: Loader: Injecting process 4416 (thread 4420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4416
2020-02-14 15:45:08,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4640
2020-02-14 15:45:08,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,546 [root] DEBUG: Loader: Injecting process 4640 (thread 4616) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4640
2020-02-14 15:45:08,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4640
2020-02-14 15:45:08,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,578 [root] DEBUG: Loader: Injecting process 4640 (thread 4616) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4640
2020-02-14 15:45:08,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4716
2020-02-14 15:45:08,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,592 [root] DEBUG: Loader: Injecting process 4716 (thread 4732) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4716
2020-02-14 15:45:08,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4716
2020-02-14 15:45:08,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,625 [root] DEBUG: Loader: Injecting process 4716 (thread 4732) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4716
2020-02-14 15:45:08,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4868
2020-02-14 15:45:08,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,640 [root] DEBUG: Loader: Injecting process 4868 (thread 4904) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4868
2020-02-14 15:45:08,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4868
2020-02-14 15:45:08,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,671 [root] DEBUG: Loader: Injecting process 4868 (thread 4904) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4868
2020-02-14 15:45:08,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5068
2020-02-14 15:45:08,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,687 [root] DEBUG: Loader: Injecting process 5068 (thread 5072) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5068
2020-02-14 15:45:08,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5068
2020-02-14 15:45:08,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,717 [root] DEBUG: Loader: Injecting process 5068 (thread 5072) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5068
2020-02-14 15:45:08,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5128
2020-02-14 15:45:08,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,733 [root] DEBUG: Loader: Injecting process 5128 (thread 5148) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5128
2020-02-14 15:45:08,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5128
2020-02-14 15:45:08,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,765 [root] DEBUG: Loader: Injecting process 5128 (thread 5148) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5128
2020-02-14 15:45:08,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5320
2020-02-14 15:45:08,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,796 [root] DEBUG: Loader: Injecting process 5320 (thread 5352) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:08,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5320
2020-02-14 15:45:08,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5320
2020-02-14 15:45:08,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:08,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:08,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:08,967 [root] DEBUG: Loader: Injecting process 5320 (thread 5352) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:08,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:08,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:08,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5320
2020-02-14 15:45:08,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5540
2020-02-14 15:45:09,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:09,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:09,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:09,187 [root] DEBUG: Loader: Injecting process 5540 (thread 5532) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:09,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:09,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:09,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:09,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:09,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5540
2020-02-14 15:45:09,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5540
2020-02-14 15:45:10,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,030 [root] DEBUG: Loader: Injecting process 5540 (thread 5532) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5540
2020-02-14 15:45:10,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5700
2020-02-14 15:45:10,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,046 [root] DEBUG: Loader: Injecting process 5700 (thread 5720) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5700
2020-02-14 15:45:10,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5700
2020-02-14 15:45:10,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,062 [root] DEBUG: Loader: Injecting process 5700 (thread 5720) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5700
2020-02-14 15:45:10,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5808
2020-02-14 15:45:10,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,092 [root] DEBUG: Loader: Injecting process 5808 (thread 5828) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5808
2020-02-14 15:45:10,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5808
2020-02-14 15:45:10,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,125 [root] DEBUG: Loader: Injecting process 5808 (thread 5828) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5808
2020-02-14 15:45:10,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5936
2020-02-14 15:45:10,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,140 [root] DEBUG: Loader: Injecting process 5936 (thread 5980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5936
2020-02-14 15:45:10,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5936
2020-02-14 15:45:10,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,171 [root] DEBUG: Loader: Injecting process 5936 (thread 5980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5936
2020-02-14 15:45:10,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6108
2020-02-14 15:45:10,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,187 [root] DEBUG: Loader: Injecting process 6108 (thread 6096) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6108
2020-02-14 15:45:10,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6108
2020-02-14 15:45:10,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,217 [root] DEBUG: Loader: Injecting process 6108 (thread 6096) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6108
2020-02-14 15:45:10,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4156
2020-02-14 15:45:10,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,233 [root] DEBUG: Loader: Injecting process 4156 (thread 4160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4156
2020-02-14 15:45:10,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4156
2020-02-14 15:45:10,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,265 [root] DEBUG: Loader: Injecting process 4156 (thread 4160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4156
2020-02-14 15:45:10,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4412
2020-02-14 15:45:10,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,280 [root] DEBUG: Loader: Injecting process 4412 (thread 4400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4412
2020-02-14 15:45:10,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4412
2020-02-14 15:45:10,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,312 [root] DEBUG: Loader: Injecting process 4412 (thread 4400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4412
2020-02-14 15:45:10,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4588
2020-02-14 15:45:10,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,328 [root] DEBUG: Loader: Injecting process 4588 (thread 4592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4588
2020-02-14 15:45:10,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4588
2020-02-14 15:45:10,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,358 [root] DEBUG: Loader: Injecting process 4588 (thread 4592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4588
2020-02-14 15:45:10,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4724
2020-02-14 15:45:10,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,375 [root] DEBUG: Loader: Injecting process 4724 (thread 4744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4724
2020-02-14 15:45:10,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4724
2020-02-14 15:45:10,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,405 [root] DEBUG: Loader: Injecting process 4724 (thread 4744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4724
2020-02-14 15:45:10,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4920
2020-02-14 15:45:10,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,437 [root] DEBUG: Loader: Injecting process 4920 (thread 4936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4920
2020-02-14 15:45:10,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4920
2020-02-14 15:45:10,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,483 [root] DEBUG: Loader: Injecting process 4920 (thread 4936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4920
2020-02-14 15:45:10,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5076
2020-02-14 15:45:10,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,500 [root] DEBUG: Loader: Injecting process 5076 (thread 5084) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5076
2020-02-14 15:45:10,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5076
2020-02-14 15:45:10,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,530 [root] DEBUG: Loader: Injecting process 5076 (thread 5084) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5076
2020-02-14 15:45:10,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5300
2020-02-14 15:45:10,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,546 [root] DEBUG: Loader: Injecting process 5300 (thread 5272) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5300
2020-02-14 15:45:10,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5300
2020-02-14 15:45:10,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,578 [root] DEBUG: Loader: Injecting process 5300 (thread 5272) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5300
2020-02-14 15:45:10,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5516
2020-02-14 15:45:10,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,592 [root] DEBUG: Loader: Injecting process 5516 (thread 5416) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5516
2020-02-14 15:45:10,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5516
2020-02-14 15:45:10,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,608 [root] DEBUG: Loader: Injecting process 5516 (thread 5416) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5516
2020-02-14 15:45:10,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5624
2020-02-14 15:45:10,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,640 [root] DEBUG: Loader: Injecting process 5624 (thread 5692) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5624
2020-02-14 15:45:10,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5624
2020-02-14 15:45:10,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,671 [root] DEBUG: Loader: Injecting process 5624 (thread 5692) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5624
2020-02-14 15:45:10,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5868
2020-02-14 15:45:10,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,687 [root] DEBUG: Loader: Injecting process 5868 (thread 5900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5868
2020-02-14 15:45:10,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5868
2020-02-14 15:45:10,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,717 [root] DEBUG: Loader: Injecting process 5868 (thread 5900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5868
2020-02-14 15:45:10,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6028
2020-02-14 15:45:10,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,733 [root] DEBUG: Loader: Injecting process 6028 (thread 6032) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6028
2020-02-14 15:45:10,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6028
2020-02-14 15:45:10,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,765 [root] DEBUG: Loader: Injecting process 6028 (thread 6032) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6028
2020-02-14 15:45:10,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4128
2020-02-14 15:45:10,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,780 [root] DEBUG: Loader: Injecting process 4128 (thread 4132) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4128
2020-02-14 15:45:10,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4128
2020-02-14 15:45:10,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,828 [root] DEBUG: Loader: Injecting process 4128 (thread 4132) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4128
2020-02-14 15:45:10,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4332
2020-02-14 15:45:10,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,842 [root] DEBUG: Loader: Injecting process 4332 (thread 4324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4332
2020-02-14 15:45:10,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4332
2020-02-14 15:45:10,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,890 [root] DEBUG: Loader: Injecting process 4332 (thread 4324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4332
2020-02-14 15:45:10,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4476
2020-02-14 15:45:10,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,905 [root] DEBUG: Loader: Injecting process 4476 (thread 4580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4476
2020-02-14 15:45:10,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4476
2020-02-14 15:45:10,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,937 [root] DEBUG: Loader: Injecting process 4476 (thread 4580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4476
2020-02-14 15:45:10,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4820
2020-02-14 15:45:10,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,953 [root] DEBUG: Loader: Injecting process 4820 (thread 4824) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:10,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4820
2020-02-14 15:45:10,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4820
2020-02-14 15:45:10,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:10,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:10,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:10,983 [root] DEBUG: Loader: Injecting process 4820 (thread 4824) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:10,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:10,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:10,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4820
2020-02-14 15:45:11,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4924
2020-02-14 15:45:11,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,000 [root] DEBUG: Loader: Injecting process 4924 (thread 4900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4924
2020-02-14 15:45:11,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4924
2020-02-14 15:45:11,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,030 [root] DEBUG: Loader: Injecting process 4924 (thread 4900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4924
2020-02-14 15:45:11,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5180
2020-02-14 15:45:11,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,046 [root] DEBUG: Loader: Injecting process 5180 (thread 5200) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5180
2020-02-14 15:45:11,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5180
2020-02-14 15:45:11,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,078 [root] DEBUG: Loader: Injecting process 5180 (thread 5200) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5180
2020-02-14 15:45:11,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5472
2020-02-14 15:45:11,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,092 [root] DEBUG: Loader: Injecting process 5472 (thread 5408) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5472
2020-02-14 15:45:11,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5472
2020-02-14 15:45:11,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,108 [root] DEBUG: Loader: Injecting process 5472 (thread 5408) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5472
2020-02-14 15:45:11,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5544
2020-02-14 15:45:11,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,140 [root] DEBUG: Loader: Injecting process 5544 (thread 5644) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5544
2020-02-14 15:45:11,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5544
2020-02-14 15:45:11,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,171 [root] DEBUG: Loader: Injecting process 5544 (thread 5644) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5544
2020-02-14 15:45:11,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5908
2020-02-14 15:45:11,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,187 [root] DEBUG: Loader: Injecting process 5908 (thread 5940) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5908
2020-02-14 15:45:11,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5908
2020-02-14 15:45:11,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,217 [root] DEBUG: Loader: Injecting process 5908 (thread 5940) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5908
2020-02-14 15:45:11,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6040
2020-02-14 15:45:11,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,358 [root] DEBUG: Loader: Injecting process 6040 (thread 6000) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6040
2020-02-14 15:45:11,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6040
2020-02-14 15:45:11,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,375 [root] DEBUG: Loader: Injecting process 6040 (thread 6000) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6040
2020-02-14 15:45:11,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4300
2020-02-14 15:45:11,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,405 [root] DEBUG: Loader: Injecting process 4300 (thread 4236) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4300
2020-02-14 15:45:11,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4300
2020-02-14 15:45:11,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,655 [root] DEBUG: Loader: Injecting process 4300 (thread 4236) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4300
2020-02-14 15:45:11,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4504
2020-02-14 15:45:11,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,671 [root] DEBUG: Loader: Injecting process 4504 (thread 4540) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4504
2020-02-14 15:45:11,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4504
2020-02-14 15:45:11,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,703 [root] DEBUG: Loader: Injecting process 4504 (thread 4540) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4504
2020-02-14 15:45:11,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4708
2020-02-14 15:45:11,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,717 [root] DEBUG: Loader: Injecting process 4708 (thread 4720) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4708
2020-02-14 15:45:11,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4708
2020-02-14 15:45:11,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,750 [root] DEBUG: Loader: Injecting process 4708 (thread 4720) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4708
2020-02-14 15:45:11,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5112
2020-02-14 15:45:11,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,842 [root] DEBUG: Loader: Injecting process 5112 (thread 4956) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5112
2020-02-14 15:45:11,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5112
2020-02-14 15:45:11,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,875 [root] DEBUG: Loader: Injecting process 5112 (thread 4956) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5112
2020-02-14 15:45:11,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5204
2020-02-14 15:45:11,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,890 [root] DEBUG: Loader: Injecting process 5204 (thread 5208) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5204
2020-02-14 15:45:11,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5204
2020-02-14 15:45:11,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,921 [root] DEBUG: Loader: Injecting process 5204 (thread 5208) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:11,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5204
2020-02-14 15:45:11,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5688
2020-02-14 15:45:11,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:11,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:11,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:11,967 [root] DEBUG: Loader: Injecting process 5688 (thread 5604) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:11,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:11,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:11,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5688
2020-02-14 15:45:12,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5688
2020-02-14 15:45:12,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,000 [root] DEBUG: Loader: Injecting process 5688 (thread 5604) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5688
2020-02-14 15:45:12,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5932
2020-02-14 15:45:12,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,015 [root] DEBUG: Loader: Injecting process 5932 (thread 6008) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5932
2020-02-14 15:45:12,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5932
2020-02-14 15:45:12,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,046 [root] DEBUG: Loader: Injecting process 5932 (thread 6008) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5932
2020-02-14 15:45:12,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4116
2020-02-14 15:45:12,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,062 [root] DEBUG: Loader: Injecting process 4116 (thread 4120) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4116
2020-02-14 15:45:12,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4116
2020-02-14 15:45:12,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,092 [root] DEBUG: Loader: Injecting process 4116 (thread 4120) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4116
2020-02-14 15:45:12,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4260
2020-02-14 15:45:12,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,108 [root] DEBUG: Loader: Injecting process 4260 (thread 4388) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4260
2020-02-14 15:45:12,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4260
2020-02-14 15:45:12,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,140 [root] DEBUG: Loader: Injecting process 4260 (thread 4388) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4260
2020-02-14 15:45:12,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4728
2020-02-14 15:45:12,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,155 [root] DEBUG: Loader: Injecting process 4728 (thread 4700) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,155 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4728
2020-02-14 15:45:12,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4728
2020-02-14 15:45:12,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,187 [root] DEBUG: Loader: Injecting process 4728 (thread 4700) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4728
2020-02-14 15:45:12,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5108
2020-02-14 15:45:12,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,296 [root] DEBUG: Loader: Injecting process 5108 (thread 4980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5108
2020-02-14 15:45:12,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5108
2020-02-14 15:45:12,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,483 [root] DEBUG: Loader: Injecting process 5108 (thread 4980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5108
2020-02-14 15:45:12,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5280
2020-02-14 15:45:12,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,515 [root] DEBUG: Loader: Injecting process 5280 (thread 5304) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5280
2020-02-14 15:45:12,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5280
2020-02-14 15:45:12,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,546 [root] DEBUG: Loader: Injecting process 5280 (thread 5304) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5280
2020-02-14 15:45:12,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5684
2020-02-14 15:45:12,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,562 [root] DEBUG: Loader: Injecting process 5684 (thread 5840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5684
2020-02-14 15:45:12,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5684
2020-02-14 15:45:12,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,592 [root] DEBUG: Loader: Injecting process 5684 (thread 5840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5684
2020-02-14 15:45:12,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6120
2020-02-14 15:45:12,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,703 [root] DEBUG: Loader: Injecting process 6120 (thread 6136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6120
2020-02-14 15:45:12,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6120
2020-02-14 15:45:12,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,703 [root] DEBUG: Loader: Injecting process 6120 (thread 6136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6120
2020-02-14 15:45:12,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4344
2020-02-14 15:45:12,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,750 [root] DEBUG: Loader: Injecting process 4344 (thread 4308) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4344
2020-02-14 15:45:12,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4344
2020-02-14 15:45:12,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,780 [root] DEBUG: Loader: Injecting process 4344 (thread 4308) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4344
2020-02-14 15:45:12,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4672
2020-02-14 15:45:12,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,890 [root] DEBUG: Loader: Injecting process 4672 (thread 4740) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4672
2020-02-14 15:45:12,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4672
2020-02-14 15:45:12,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,921 [root] DEBUG: Loader: Injecting process 4672 (thread 4740) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4672
2020-02-14 15:45:12,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5168
2020-02-14 15:45:12,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,937 [root] DEBUG: Loader: Injecting process 5168 (thread 5056) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5168
2020-02-14 15:45:12,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5168
2020-02-14 15:45:12,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,953 [root] DEBUG: Loader: Injecting process 5168 (thread 5056) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:12,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5168
2020-02-14 15:45:12,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5588
2020-02-14 15:45:12,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:12,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:12,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:12,983 [root] DEBUG: Loader: Injecting process 5588 (thread 5284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:12,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:12,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:12,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5588
2020-02-14 15:45:13,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5588
2020-02-14 15:45:13,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,015 [root] DEBUG: Loader: Injecting process 5588 (thread 5284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5588
2020-02-14 15:45:13,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6016
2020-02-14 15:45:13,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,030 [root] DEBUG: Loader: Injecting process 6016 (thread 5812) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:13,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6016
2020-02-14 15:45:13,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6016
2020-02-14 15:45:13,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,062 [root] DEBUG: Loader: Injecting process 6016 (thread 5812) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6016
2020-02-14 15:45:13,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4252
2020-02-14 15:45:13,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,078 [root] DEBUG: Loader: Injecting process 4252 (thread 4152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:13,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4252
2020-02-14 15:45:13,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4252
2020-02-14 15:45:13,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,108 [root] DEBUG: Loader: Injecting process 4252 (thread 4152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4252
2020-02-14 15:45:13,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4632
2020-02-14 15:45:13,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,655 [root] DEBUG: Loader: Injecting process 4632 (thread 4704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:13,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4632
2020-02-14 15:45:13,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4632
2020-02-14 15:45:13,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,687 [root] DEBUG: Loader: Injecting process 4632 (thread 4704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4632
2020-02-14 15:45:13,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5356
2020-02-14 15:45:13,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,733 [root] DEBUG: Loader: Injecting process 5356 (thread 5308) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:13,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5356
2020-02-14 15:45:13,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5356
2020-02-14 15:45:13,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,765 [root] DEBUG: Loader: Injecting process 5356 (thread 5308) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5356
2020-02-14 15:45:13,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5732
2020-02-14 15:45:13,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,780 [root] DEBUG: Loader: Injecting process 5732 (thread 5680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:13,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5732
2020-02-14 15:45:13,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5732
2020-02-14 15:45:13,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,812 [root] DEBUG: Loader: Injecting process 5732 (thread 5680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5732
2020-02-14 15:45:13,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4328
2020-02-14 15:45:13,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,828 [root] DEBUG: Loader: Injecting process 4328 (thread 4408) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:13,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4328
2020-02-14 15:45:13,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4328
2020-02-14 15:45:13,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,858 [root] DEBUG: Loader: Injecting process 4328 (thread 4408) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4328
2020-02-14 15:45:13,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4628
2020-02-14 15:45:13,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,875 [root] DEBUG: Loader: Injecting process 4628 (thread 4536) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:13,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4628
2020-02-14 15:45:13,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4628
2020-02-14 15:45:13,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:13,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:13,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:13,905 [root] DEBUG: Loader: Injecting process 4628 (thread 4536) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:13,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:13,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:13,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4628
2020-02-14 15:45:13,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5252
2020-02-14 15:45:14,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,562 [root] DEBUG: Loader: Injecting process 5252 (thread 5592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5252
2020-02-14 15:45:14,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5252
2020-02-14 15:45:14,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,592 [root] DEBUG: Loader: Injecting process 5252 (thread 5592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5252
2020-02-14 15:45:14,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5776
2020-02-14 15:45:14,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,608 [root] DEBUG: Loader: Injecting process 5776 (thread 6084) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5776
2020-02-14 15:45:14,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5776
2020-02-14 15:45:14,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,640 [root] DEBUG: Loader: Injecting process 5776 (thread 6084) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5776
2020-02-14 15:45:14,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6088
2020-02-14 15:45:14,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,655 [root] DEBUG: Loader: Injecting process 6088 (thread 4436) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6088
2020-02-14 15:45:14,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6088
2020-02-14 15:45:14,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,687 [root] DEBUG: Loader: Injecting process 6088 (thread 4436) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6088
2020-02-14 15:45:14,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4928
2020-02-14 15:45:14,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,703 [root] DEBUG: Loader: Injecting process 4928 (thread 4888) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4928
2020-02-14 15:45:14,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4928
2020-02-14 15:45:14,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,733 [root] DEBUG: Loader: Injecting process 4928 (thread 4888) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4928
2020-02-14 15:45:14,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6012
2020-02-14 15:45:14,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,750 [root] DEBUG: Loader: Injecting process 6012 (thread 6064) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6012
2020-02-14 15:45:14,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6012
2020-02-14 15:45:14,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,780 [root] DEBUG: Loader: Injecting process 6012 (thread 6064) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6012
2020-02-14 15:45:14,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4644
2020-02-14 15:45:14,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,812 [root] DEBUG: Loader: Injecting process 4644 (thread 4572) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4644
2020-02-14 15:45:14,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4644
2020-02-14 15:45:14,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,858 [root] DEBUG: Loader: Injecting process 4644 (thread 4572) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4644
2020-02-14 15:45:14,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5380
2020-02-14 15:45:14,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,875 [root] DEBUG: Loader: Injecting process 5380 (thread 5192) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5380
2020-02-14 15:45:14,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5380
2020-02-14 15:45:14,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,905 [root] DEBUG: Loader: Injecting process 5380 (thread 5192) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5380
2020-02-14 15:45:14,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4600
2020-02-14 15:45:14,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,921 [root] DEBUG: Loader: Injecting process 4600 (thread 6076) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:14,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4600
2020-02-14 15:45:14,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4600
2020-02-14 15:45:14,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:14,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:14,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:14,953 [root] DEBUG: Loader: Injecting process 4600 (thread 6076) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:14,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:14,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:14,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4600
2020-02-14 15:45:14,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5064
2020-02-14 15:45:15,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:15,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:15,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:15,000 [root] DEBUG: Loader: Injecting process 5064 (thread 5504) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:15,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:15,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5064
2020-02-14 15:45:15,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5064
2020-02-14 15:45:15,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:15,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:15,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:15,030 [root] DEBUG: Loader: Injecting process 5064 (thread 5504) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:15,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:15,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5064
2020-02-14 15:45:15,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4876
2020-02-14 15:45:15,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:15,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:15,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:15,046 [root] DEBUG: Loader: Injecting process 4876 (thread 4800) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:15,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:15,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4876
2020-02-14 15:45:15,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4876
2020-02-14 15:45:15,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:15,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:15,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:15,078 [root] DEBUG: Loader: Injecting process 4876 (thread 4800) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:15,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:15,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4876
2020-02-14 15:45:15,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3444
2020-02-14 15:45:15,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:15,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:15,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:15,092 [root] DEBUG: Loader: Injecting process 3444 (thread 5744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:15,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:15,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:15,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3444
2020-02-14 15:45:15,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3444
2020-02-14 15:45:16,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,000 [root] DEBUG: Loader: Injecting process 3444 (thread 5744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3444
2020-02-14 15:45:16,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5576
2020-02-14 15:45:16,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,030 [root] DEBUG: Loader: Injecting process 5576 (thread 5836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5576
2020-02-14 15:45:16,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5576
2020-02-14 15:45:16,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,046 [root] DEBUG: Loader: Injecting process 5576 (thread 5836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5576
2020-02-14 15:45:16,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5012
2020-02-14 15:45:16,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,203 [root] DEBUG: Loader: Injecting process 5012 (thread 4812) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5012
2020-02-14 15:45:16,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5012
2020-02-14 15:45:16,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,217 [root] DEBUG: Loader: Injecting process 5012 (thread 4812) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5012
2020-02-14 15:45:16,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4968
2020-02-14 15:45:16,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,250 [root] DEBUG: Loader: Injecting process 4968 (thread 4188) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4968
2020-02-14 15:45:16,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4968
2020-02-14 15:45:16,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,280 [root] DEBUG: Loader: Injecting process 4968 (thread 4188) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4968
2020-02-14 15:45:16,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4880
2020-02-14 15:45:16,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,296 [root] DEBUG: Loader: Injecting process 4880 (thread 4692) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4880
2020-02-14 15:45:16,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4880
2020-02-14 15:45:16,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,328 [root] DEBUG: Loader: Injecting process 4880 (thread 4692) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4880
2020-02-14 15:45:16,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5032
2020-02-14 15:45:16,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,342 [root] DEBUG: Loader: Injecting process 5032 (thread 4244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5032
2020-02-14 15:45:16,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5032
2020-02-14 15:45:16,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,358 [root] DEBUG: Loader: Injecting process 5032 (thread 4244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5032
2020-02-14 15:45:16,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5220
2020-02-14 15:45:16,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,592 [root] DEBUG: Loader: Injecting process 5220 (thread 4840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5220
2020-02-14 15:45:16,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5220
2020-02-14 15:45:16,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,608 [root] DEBUG: Loader: Injecting process 5220 (thread 4840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5220
2020-02-14 15:45:16,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6172
2020-02-14 15:45:16,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,812 [root] DEBUG: Loader: Injecting process 6172 (thread 6176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6172
2020-02-14 15:45:16,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6172
2020-02-14 15:45:16,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,828 [root] DEBUG: Loader: Injecting process 6172 (thread 6176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6172
2020-02-14 15:45:16,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6268
2020-02-14 15:45:16,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,858 [root] DEBUG: Loader: Injecting process 6268 (thread 6272) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:16,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6268
2020-02-14 15:45:16,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6268
2020-02-14 15:45:16,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:16,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:16,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:16,890 [root] DEBUG: Loader: Injecting process 6268 (thread 6272) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:16,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:16,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:16,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6268
2020-02-14 15:45:16,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6364
2020-02-14 15:45:17,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,030 [root] DEBUG: Loader: Injecting process 6364 (thread 6368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6364
2020-02-14 15:45:17,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6364
2020-02-14 15:45:17,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,062 [root] DEBUG: Loader: Injecting process 6364 (thread 6368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6364
2020-02-14 15:45:17,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6464
2020-02-14 15:45:17,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,092 [root] DEBUG: Loader: Injecting process 6464 (thread 6468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6464
2020-02-14 15:45:17,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6464
2020-02-14 15:45:17,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,125 [root] DEBUG: Loader: Injecting process 6464 (thread 6468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6464
2020-02-14 15:45:17,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6560
2020-02-14 15:45:17,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,155 [root] DEBUG: Loader: Injecting process 6560 (thread 6564) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,155 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6560
2020-02-14 15:45:17,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6560
2020-02-14 15:45:17,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,171 [root] DEBUG: Loader: Injecting process 6560 (thread 6564) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6560
2020-02-14 15:45:17,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6656
2020-02-14 15:45:17,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,203 [root] DEBUG: Loader: Injecting process 6656 (thread 6660) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6656
2020-02-14 15:45:17,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6656
2020-02-14 15:45:17,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,217 [root] DEBUG: Loader: Injecting process 6656 (thread 6660) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6656
2020-02-14 15:45:17,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6764
2020-02-14 15:45:17,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,250 [root] DEBUG: Loader: Injecting process 6764 (thread 6768) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6764
2020-02-14 15:45:17,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6764
2020-02-14 15:45:17,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,280 [root] DEBUG: Loader: Injecting process 6764 (thread 6768) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6764
2020-02-14 15:45:17,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6860
2020-02-14 15:45:17,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,328 [root] DEBUG: Loader: Injecting process 6860 (thread 6864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6860
2020-02-14 15:45:17,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6860
2020-02-14 15:45:17,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,342 [root] DEBUG: Loader: Injecting process 6860 (thread 6864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6860
2020-02-14 15:45:17,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6956
2020-02-14 15:45:17,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,375 [root] DEBUG: Loader: Injecting process 6956 (thread 6960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6956
2020-02-14 15:45:17,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6956
2020-02-14 15:45:17,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,405 [root] DEBUG: Loader: Injecting process 6956 (thread 6960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6956
2020-02-14 15:45:17,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7052
2020-02-14 15:45:17,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,421 [root] DEBUG: Loader: Injecting process 7052 (thread 7056) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7052
2020-02-14 15:45:17,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7052
2020-02-14 15:45:17,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,453 [root] DEBUG: Loader: Injecting process 7052 (thread 7056) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7052
2020-02-14 15:45:17,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7148
2020-02-14 15:45:17,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,467 [root] DEBUG: Loader: Injecting process 7148 (thread 7152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7148
2020-02-14 15:45:17,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7148
2020-02-14 15:45:17,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,500 [root] DEBUG: Loader: Injecting process 7148 (thread 7152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7148
2020-02-14 15:45:17,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7244
2020-02-14 15:45:17,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,655 [root] DEBUG: Loader: Injecting process 7244 (thread 7248) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7244
2020-02-14 15:45:17,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7244
2020-02-14 15:45:17,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,687 [root] DEBUG: Loader: Injecting process 7244 (thread 7248) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7244
2020-02-14 15:45:17,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7340
2020-02-14 15:45:17,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,717 [root] DEBUG: Loader: Injecting process 7340 (thread 7344) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7340
2020-02-14 15:45:17,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7340
2020-02-14 15:45:17,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,750 [root] DEBUG: Loader: Injecting process 7340 (thread 7344) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7340
2020-02-14 15:45:17,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7436
2020-02-14 15:45:17,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,765 [root] DEBUG: Loader: Injecting process 7436 (thread 7440) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7436
2020-02-14 15:45:17,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7436
2020-02-14 15:45:17,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,796 [root] DEBUG: Loader: Injecting process 7436 (thread 7440) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7436
2020-02-14 15:45:17,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7532
2020-02-14 15:45:17,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,812 [root] DEBUG: Loader: Injecting process 7532 (thread 7536) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7532
2020-02-14 15:45:17,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7532
2020-02-14 15:45:17,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,842 [root] DEBUG: Loader: Injecting process 7532 (thread 7536) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7532
2020-02-14 15:45:17,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7628
2020-02-14 15:45:17,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,905 [root] DEBUG: Loader: Injecting process 7628 (thread 7632) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7628
2020-02-14 15:45:17,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7628
2020-02-14 15:45:17,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,937 [root] DEBUG: Loader: Injecting process 7628 (thread 7632) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7628
2020-02-14 15:45:17,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7724
2020-02-14 15:45:17,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,953 [root] DEBUG: Loader: Injecting process 7724 (thread 7728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:17,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7724
2020-02-14 15:45:17,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7724
2020-02-14 15:45:17,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:17,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:17,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:17,983 [root] DEBUG: Loader: Injecting process 7724 (thread 7728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:17,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:17,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:17,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7724
2020-02-14 15:45:18,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7820
2020-02-14 15:45:18,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,000 [root] DEBUG: Loader: Injecting process 7820 (thread 7824) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:18,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7820
2020-02-14 15:45:18,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7820
2020-02-14 15:45:18,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,030 [root] DEBUG: Loader: Injecting process 7820 (thread 7824) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:18,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7820
2020-02-14 15:45:18,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7916
2020-02-14 15:45:18,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,046 [root] DEBUG: Loader: Injecting process 7916 (thread 7920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:18,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7916
2020-02-14 15:45:18,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7916
2020-02-14 15:45:18,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,078 [root] DEBUG: Loader: Injecting process 7916 (thread 7920) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:18,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7916
2020-02-14 15:45:18,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8012
2020-02-14 15:45:18,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,233 [root] DEBUG: Loader: Injecting process 8012 (thread 8016) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:18,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8012
2020-02-14 15:45:18,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8012
2020-02-14 15:45:18,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,265 [root] DEBUG: Loader: Injecting process 8012 (thread 8016) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:18,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8012
2020-02-14 15:45:18,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8108
2020-02-14 15:45:18,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,483 [root] DEBUG: Loader: Injecting process 8108 (thread 8112) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:18,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8108
2020-02-14 15:45:18,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8108
2020-02-14 15:45:18,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,515 [root] DEBUG: Loader: Injecting process 8108 (thread 8112) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:18,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8108
2020-02-14 15:45:18,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6156
2020-02-14 15:45:18,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,655 [root] DEBUG: Loader: Injecting process 6156 (thread 6160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:18,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6156
2020-02-14 15:45:18,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6156
2020-02-14 15:45:18,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,671 [root] DEBUG: Loader: Injecting process 6156 (thread 6160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:18,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6156
2020-02-14 15:45:18,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6224
2020-02-14 15:45:18,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,687 [root] DEBUG: Loader: Injecting process 6224 (thread 6228) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:18,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6224
2020-02-14 15:45:18,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6224
2020-02-14 15:45:18,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,717 [root] DEBUG: Loader: Injecting process 6224 (thread 6228) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:18,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6224
2020-02-14 15:45:18,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6396
2020-02-14 15:45:18,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,953 [root] DEBUG: Loader: Injecting process 6396 (thread 6400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:18,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6396
2020-02-14 15:45:18,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6396
2020-02-14 15:45:18,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:18,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:18,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:18,967 [root] DEBUG: Loader: Injecting process 6396 (thread 6400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:18,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:18,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:18,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6396
2020-02-14 15:45:19,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6508
2020-02-14 15:45:19,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,000 [root] DEBUG: Loader: Injecting process 6508 (thread 6484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6508
2020-02-14 15:45:19,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6508
2020-02-14 15:45:19,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,030 [root] DEBUG: Loader: Injecting process 6508 (thread 6484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6508
2020-02-14 15:45:19,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6608
2020-02-14 15:45:19,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,046 [root] DEBUG: Loader: Injecting process 6608 (thread 6628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6608
2020-02-14 15:45:19,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6608
2020-02-14 15:45:19,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,078 [root] DEBUG: Loader: Injecting process 6608 (thread 6628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6608
2020-02-14 15:45:19,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6736
2020-02-14 15:45:19,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,092 [root] DEBUG: Loader: Injecting process 6736 (thread 6740) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6736
2020-02-14 15:45:19,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6736
2020-02-14 15:45:19,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,125 [root] DEBUG: Loader: Injecting process 6736 (thread 6740) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6736
2020-02-14 15:45:19,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5492
2020-02-14 15:45:19,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,203 [root] DEBUG: Loader: Injecting process 5492 (thread 5360) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5492
2020-02-14 15:45:19,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5492
2020-02-14 15:45:19,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,233 [root] DEBUG: Loader: Injecting process 5492 (thread 5360) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5492
2020-02-14 15:45:19,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6816
2020-02-14 15:45:19,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,250 [root] DEBUG: Loader: Injecting process 6816 (thread 6820) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-02-14 15:45:19,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6816
2020-02-14 15:45:19,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,265 [root] DEBUG: Loader: Injecting process 6816 (thread 6820) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-02-14 15:45:19,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6904
2020-02-14 15:45:19,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,296 [root] DEBUG: Loader: Injecting process 6904 (thread 6880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6904
2020-02-14 15:45:19,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6904
2020-02-14 15:45:19,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,328 [root] DEBUG: Loader: Injecting process 6904 (thread 6880) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6904
2020-02-14 15:45:19,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7004
2020-02-14 15:45:19,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,342 [root] DEBUG: Loader: Injecting process 7004 (thread 7024) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7004
2020-02-14 15:45:19,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7004
2020-02-14 15:45:19,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,358 [root] DEBUG: Loader: Injecting process 7004 (thread 7024) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7004
2020-02-14 15:45:19,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7132
2020-02-14 15:45:19,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,405 [root] DEBUG: Loader: Injecting process 7132 (thread 7136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7132
2020-02-14 15:45:19,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7132
2020-02-14 15:45:19,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,437 [root] DEBUG: Loader: Injecting process 7132 (thread 7136) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7132
2020-02-14 15:45:19,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7200
2020-02-14 15:45:19,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,453 [root] DEBUG: Loader: Injecting process 7200 (thread 7204) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7200
2020-02-14 15:45:19,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7200
2020-02-14 15:45:19,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,483 [root] DEBUG: Loader: Injecting process 7200 (thread 7204) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7200
2020-02-14 15:45:19,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7336
2020-02-14 15:45:19,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,500 [root] DEBUG: Loader: Injecting process 7336 (thread 7368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7336
2020-02-14 15:45:19,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7336
2020-02-14 15:45:19,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,530 [root] DEBUG: Loader: Injecting process 7336 (thread 7368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7336
2020-02-14 15:45:19,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7476
2020-02-14 15:45:19,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,546 [root] DEBUG: Loader: Injecting process 7476 (thread 7480) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7476
2020-02-14 15:45:19,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7476
2020-02-14 15:45:19,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,578 [root] DEBUG: Loader: Injecting process 7476 (thread 7480) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7476
2020-02-14 15:45:19,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7548
2020-02-14 15:45:19,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,592 [root] DEBUG: Loader: Injecting process 7548 (thread 7580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7548
2020-02-14 15:45:19,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7548
2020-02-14 15:45:19,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,625 [root] DEBUG: Loader: Injecting process 7548 (thread 7580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7548
2020-02-14 15:45:19,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7704
2020-02-14 15:45:19,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,655 [root] DEBUG: Loader: Injecting process 7704 (thread 7708) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7704
2020-02-14 15:45:19,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7704
2020-02-14 15:45:19,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,671 [root] DEBUG: Loader: Injecting process 7704 (thread 7708) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7704
2020-02-14 15:45:19,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7788
2020-02-14 15:45:19,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,703 [root] DEBUG: Loader: Injecting process 7788 (thread 7776) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-02-14 15:45:19,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7788
2020-02-14 15:45:19,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,717 [root] DEBUG: Loader: Injecting process 7788 (thread 7776) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-02-14 15:45:19,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7944
2020-02-14 15:45:19,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,750 [root] DEBUG: Loader: Injecting process 7944 (thread 7948) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7944
2020-02-14 15:45:19,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7944
2020-02-14 15:45:19,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,780 [root] DEBUG: Loader: Injecting process 7944 (thread 7948) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7944
2020-02-14 15:45:19,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8056
2020-02-14 15:45:19,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,796 [root] DEBUG: Loader: Injecting process 8056 (thread 8032) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8056
2020-02-14 15:45:19,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8056
2020-02-14 15:45:19,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,828 [root] DEBUG: Loader: Injecting process 8056 (thread 8032) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8056
2020-02-14 15:45:19,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8156
2020-02-14 15:45:19,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,842 [root] DEBUG: Loader: Injecting process 8156 (thread 8176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8156
2020-02-14 15:45:19,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8156
2020-02-14 15:45:19,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,858 [root] DEBUG: Loader: Injecting process 8156 (thread 8176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8156
2020-02-14 15:45:19,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6252
2020-02-14 15:45:19,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,890 [root] DEBUG: Loader: Injecting process 6252 (thread 6256) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6252
2020-02-14 15:45:19,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6252
2020-02-14 15:45:19,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,921 [root] DEBUG: Loader: Injecting process 6252 (thread 6256) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6252
2020-02-14 15:45:19,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6336
2020-02-14 15:45:19,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,937 [root] DEBUG: Loader: Injecting process 6336 (thread 6340) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6336
2020-02-14 15:45:19,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6336
2020-02-14 15:45:19,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,967 [root] DEBUG: Loader: Injecting process 6336 (thread 6340) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:19,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6336
2020-02-14 15:45:19,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6540
2020-02-14 15:45:19,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:19,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:19,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:19,983 [root] DEBUG: Loader: Injecting process 6540 (thread 6544) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:19,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:19,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:19,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6540
2020-02-14 15:45:20,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6540
2020-02-14 15:45:20,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,015 [root] DEBUG: Loader: Injecting process 6540 (thread 6544) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6540
2020-02-14 15:45:20,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6652
2020-02-14 15:45:20,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,030 [root] DEBUG: Loader: Injecting process 6652 (thread 6644) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6652
2020-02-14 15:45:20,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6652
2020-02-14 15:45:20,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,062 [root] DEBUG: Loader: Injecting process 6652 (thread 6644) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6652
2020-02-14 15:45:20,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5448
2020-02-14 15:45:20,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,078 [root] DEBUG: Loader: Injecting process 5448 (thread 5648) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5448
2020-02-14 15:45:20,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5448
2020-02-14 15:45:20,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,108 [root] DEBUG: Loader: Injecting process 5448 (thread 5648) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5448
2020-02-14 15:45:20,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6844
2020-02-14 15:45:20,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,125 [root] DEBUG: Loader: Injecting process 6844 (thread 6848) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6844
2020-02-14 15:45:20,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6844
2020-02-14 15:45:20,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,155 [root] DEBUG: Loader: Injecting process 6844 (thread 6848) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6844
2020-02-14 15:45:20,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4496
2020-02-14 15:45:20,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,171 [root] DEBUG: Loader: Injecting process 4496 (thread 4488) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4496
2020-02-14 15:45:20,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4496
2020-02-14 15:45:20,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,203 [root] DEBUG: Loader: Injecting process 4496 (thread 4488) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4496
2020-02-14 15:45:20,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7020
2020-02-14 15:45:20,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,217 [root] DEBUG: Loader: Injecting process 7020 (thread 7008) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7020
2020-02-14 15:45:20,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7020
2020-02-14 15:45:20,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,250 [root] DEBUG: Loader: Injecting process 7020 (thread 7008) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7020
2020-02-14 15:45:20,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7188
2020-02-14 15:45:20,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,265 [root] DEBUG: Loader: Injecting process 7188 (thread 7108) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7188
2020-02-14 15:45:20,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7188
2020-02-14 15:45:20,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,296 [root] DEBUG: Loader: Injecting process 7188 (thread 7108) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7188
2020-02-14 15:45:20,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7260
2020-02-14 15:45:20,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,312 [root] DEBUG: Loader: Injecting process 7260 (thread 7324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7260
2020-02-14 15:45:20,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7260
2020-02-14 15:45:20,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,342 [root] DEBUG: Loader: Injecting process 7260 (thread 7324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7260
2020-02-14 15:45:20,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7432
2020-02-14 15:45:20,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,375 [root] DEBUG: Loader: Injecting process 7432 (thread 7464) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-02-14 15:45:20,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7432
2020-02-14 15:45:20,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,405 [root] DEBUG: Loader: Injecting process 7432 (thread 7464) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-02-14 15:45:20,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7488
2020-02-14 15:45:20,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,421 [root] DEBUG: Loader: Injecting process 7488 (thread 7492) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7488
2020-02-14 15:45:20,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7488
2020-02-14 15:45:20,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,453 [root] DEBUG: Loader: Injecting process 7488 (thread 7492) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7488
2020-02-14 15:45:20,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7716
2020-02-14 15:45:20,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,483 [root] DEBUG: Loader: Injecting process 7716 (thread 7720) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7716
2020-02-14 15:45:20,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7716
2020-02-14 15:45:20,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,500 [root] DEBUG: Loader: Injecting process 7716 (thread 7720) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7716
2020-02-14 15:45:20,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7844
2020-02-14 15:45:20,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,530 [root] DEBUG: Loader: Injecting process 7844 (thread 7848) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7844
2020-02-14 15:45:20,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7844
2020-02-14 15:45:20,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,546 [root] DEBUG: Loader: Injecting process 7844 (thread 7848) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7844
2020-02-14 15:45:20,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7912
2020-02-14 15:45:20,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,578 [root] DEBUG: Loader: Injecting process 7912 (thread 7932) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7912
2020-02-14 15:45:20,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7912
2020-02-14 15:45:20,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,592 [root] DEBUG: Loader: Injecting process 7912 (thread 7932) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7912
2020-02-14 15:45:20,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8072
2020-02-14 15:45:20,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,625 [root] DEBUG: Loader: Injecting process 8072 (thread 8076) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8072
2020-02-14 15:45:20,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8072
2020-02-14 15:45:20,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,671 [root] DEBUG: Loader: Injecting process 8072 (thread 8076) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8072
2020-02-14 15:45:20,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8188
2020-02-14 15:45:20,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,717 [root] DEBUG: Loader: Injecting process 8188 (thread 6168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8188
2020-02-14 15:45:20,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8188
2020-02-14 15:45:20,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,750 [root] DEBUG: Loader: Injecting process 8188 (thread 6168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8188
2020-02-14 15:45:20,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6332
2020-02-14 15:45:20,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,765 [root] DEBUG: Loader: Injecting process 6332 (thread 6320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6332
2020-02-14 15:45:20,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6332
2020-02-14 15:45:20,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,796 [root] DEBUG: Loader: Injecting process 6332 (thread 6320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6332
2020-02-14 15:45:20,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6492
2020-02-14 15:45:20,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,812 [root] DEBUG: Loader: Injecting process 6492 (thread 6424) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6492
2020-02-14 15:45:20,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6492
2020-02-14 15:45:20,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,828 [root] DEBUG: Loader: Injecting process 6492 (thread 6424) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6492
2020-02-14 15:45:20,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6648
2020-02-14 15:45:20,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,858 [root] DEBUG: Loader: Injecting process 6648 (thread 6672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6648
2020-02-14 15:45:20,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6648
2020-02-14 15:45:20,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,890 [root] DEBUG: Loader: Injecting process 6648 (thread 6672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6648
2020-02-14 15:45:20,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6756
2020-02-14 15:45:20,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,905 [root] DEBUG: Loader: Injecting process 6756 (thread 4636) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6756
2020-02-14 15:45:20,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6756
2020-02-14 15:45:20,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,937 [root] DEBUG: Loader: Injecting process 6756 (thread 4636) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6756
2020-02-14 15:45:20,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6784
2020-02-14 15:45:20,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,953 [root] DEBUG: Loader: Injecting process 6784 (thread 5748) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:20,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6784
2020-02-14 15:45:20,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6784
2020-02-14 15:45:20,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:20,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:20,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:20,967 [root] DEBUG: Loader: Injecting process 6784 (thread 5748) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:20,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:20,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:20,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6784
2020-02-14 15:45:21,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6984
2020-02-14 15:45:21,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,000 [root] DEBUG: Loader: Injecting process 6984 (thread 6916) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6984
2020-02-14 15:45:21,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6984
2020-02-14 15:45:21,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,030 [root] DEBUG: Loader: Injecting process 6984 (thread 6916) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6984
2020-02-14 15:45:21,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7084
2020-02-14 15:45:21,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,046 [root] DEBUG: Loader: Injecting process 7084 (thread 7120) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7084
2020-02-14 15:45:21,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7084
2020-02-14 15:45:21,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,078 [root] DEBUG: Loader: Injecting process 7084 (thread 7120) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7084
2020-02-14 15:45:21,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1124
2020-02-14 15:45:21,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,092 [root] DEBUG: Loader: Injecting process 1124 (thread 7320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1124
2020-02-14 15:45:21,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1124
2020-02-14 15:45:21,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,125 [root] DEBUG: Loader: Injecting process 1124 (thread 7320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1124
2020-02-14 15:45:21,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7516
2020-02-14 15:45:21,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,140 [root] DEBUG: Loader: Injecting process 7516 (thread 7520) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7516
2020-02-14 15:45:21,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7516
2020-02-14 15:45:21,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,171 [root] DEBUG: Loader: Injecting process 7516 (thread 7520) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7516
2020-02-14 15:45:21,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7592
2020-02-14 15:45:21,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,187 [root] DEBUG: Loader: Injecting process 7592 (thread 7624) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7592
2020-02-14 15:45:21,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7592
2020-02-14 15:45:21,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,217 [root] DEBUG: Loader: Injecting process 7592 (thread 7624) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7592
2020-02-14 15:45:21,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7784
2020-02-14 15:45:21,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,233 [root] DEBUG: Loader: Injecting process 7784 (thread 7856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7784
2020-02-14 15:45:21,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7784
2020-02-14 15:45:21,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,265 [root] DEBUG: Loader: Injecting process 7784 (thread 7856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7784
2020-02-14 15:45:21,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5412
2020-02-14 15:45:21,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,296 [root] DEBUG: Loader: Injecting process 5412 (thread 7876) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5412
2020-02-14 15:45:21,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5412
2020-02-14 15:45:21,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,328 [root] DEBUG: Loader: Injecting process 5412 (thread 7876) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5412
2020-02-14 15:45:21,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8096
2020-02-14 15:45:21,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,342 [root] DEBUG: Loader: Injecting process 8096 (thread 8144) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8096
2020-02-14 15:45:21,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8096
2020-02-14 15:45:21,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,375 [root] DEBUG: Loader: Injecting process 8096 (thread 8144) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8096
2020-02-14 15:45:21,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6204
2020-02-14 15:45:21,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,390 [root] DEBUG: Loader: Injecting process 6204 (thread 6244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6204
2020-02-14 15:45:21,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6204
2020-02-14 15:45:21,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,405 [root] DEBUG: Loader: Injecting process 6204 (thread 6244) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6204
2020-02-14 15:45:21,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6316
2020-02-14 15:45:21,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,437 [root] DEBUG: Loader: Injecting process 6316 (thread 6392) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6316
2020-02-14 15:45:21,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6316
2020-02-14 15:45:21,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,467 [root] DEBUG: Loader: Injecting process 6316 (thread 6392) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6316
2020-02-14 15:45:21,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6588
2020-02-14 15:45:21,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,483 [root] DEBUG: Loader: Injecting process 6588 (thread 6520) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6588
2020-02-14 15:45:21,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6588
2020-02-14 15:45:21,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,515 [root] DEBUG: Loader: Injecting process 6588 (thread 6520) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6588
2020-02-14 15:45:21,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6748
2020-02-14 15:45:21,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,530 [root] DEBUG: Loader: Injecting process 6748 (thread 5432) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6748
2020-02-14 15:45:21,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6748
2020-02-14 15:45:21,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,546 [root] DEBUG: Loader: Injecting process 6748 (thread 5432) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6748
2020-02-14 15:45:21,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6824
2020-02-14 15:45:21,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,578 [root] DEBUG: Loader: Injecting process 6824 (thread 5752) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6824
2020-02-14 15:45:21,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6824
2020-02-14 15:45:21,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,608 [root] DEBUG: Loader: Injecting process 6824 (thread 5752) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6824
2020-02-14 15:45:21,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7080
2020-02-14 15:45:21,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,640 [root] DEBUG: Loader: Injecting process 7080 (thread 7072) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7080
2020-02-14 15:45:21,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7080
2020-02-14 15:45:21,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,687 [root] DEBUG: Loader: Injecting process 7080 (thread 7072) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7080
2020-02-14 15:45:21,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7184
2020-02-14 15:45:21,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,703 [root] DEBUG: Loader: Injecting process 7184 (thread 7192) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-02-14 15:45:21,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7184
2020-02-14 15:45:21,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,733 [root] DEBUG: Loader: Injecting process 7184 (thread 7192) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-02-14 15:45:21,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7396
2020-02-14 15:45:21,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,750 [root] DEBUG: Loader: Injecting process 7396 (thread 7428) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7396
2020-02-14 15:45:21,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7396
2020-02-14 15:45:21,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,780 [root] DEBUG: Loader: Injecting process 7396 (thread 7428) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7396
2020-02-14 15:45:21,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7528
2020-02-14 15:45:21,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,796 [root] DEBUG: Loader: Injecting process 7528 (thread 7484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7528
2020-02-14 15:45:21,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7528
2020-02-14 15:45:21,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,828 [root] DEBUG: Loader: Injecting process 7528 (thread 7484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7528
2020-02-14 15:45:21,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7808
2020-02-14 15:45:21,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,842 [root] DEBUG: Loader: Injecting process 7808 (thread 7864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7808
2020-02-14 15:45:21,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7808
2020-02-14 15:45:21,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,875 [root] DEBUG: Loader: Injecting process 7808 (thread 7864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7808
2020-02-14 15:45:21,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7992
2020-02-14 15:45:21,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,890 [root] DEBUG: Loader: Injecting process 7992 (thread 7936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-02-14 15:45:21,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7992
2020-02-14 15:45:21,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,921 [root] DEBUG: Loader: Injecting process 7992 (thread 7936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-02-14 15:45:21,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8128
2020-02-14 15:45:21,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,937 [root] DEBUG: Loader: Injecting process 8128 (thread 8164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8128
2020-02-14 15:45:21,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8128
2020-02-14 15:45:21,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,953 [root] DEBUG: Loader: Injecting process 8128 (thread 8164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:21,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8128
2020-02-14 15:45:21,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6440
2020-02-14 15:45:21,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:21,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:21,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:21,983 [root] DEBUG: Loader: Injecting process 6440 (thread 6444) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:21,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:21,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:21,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6440
2020-02-14 15:45:22,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6440
2020-02-14 15:45:22,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,000 [root] DEBUG: Loader: Injecting process 6440 (thread 6444) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6440
2020-02-14 15:45:22,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6532
2020-02-14 15:45:22,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,030 [root] DEBUG: Loader: Injecting process 6532 (thread 6592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6532
2020-02-14 15:45:22,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6532
2020-02-14 15:45:22,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,062 [root] DEBUG: Loader: Injecting process 6532 (thread 6592) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6532
2020-02-14 15:45:22,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6732
2020-02-14 15:45:22,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,078 [root] DEBUG: Loader: Injecting process 6732 (thread 6808) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6732
2020-02-14 15:45:22,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6732
2020-02-14 15:45:22,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,108 [root] DEBUG: Loader: Injecting process 6732 (thread 6808) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6732
2020-02-14 15:45:22,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 488
2020-02-14 15:45:22,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,125 [root] DEBUG: Loader: Injecting process 488 (thread 6908) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 488
2020-02-14 15:45:22,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 488
2020-02-14 15:45:22,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,140 [root] DEBUG: Loader: Injecting process 488 (thread 6908) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 488
2020-02-14 15:45:22,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7100
2020-02-14 15:45:22,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,171 [root] DEBUG: Loader: Injecting process 7100 (thread 7048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7100
2020-02-14 15:45:22,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7100
2020-02-14 15:45:22,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,203 [root] DEBUG: Loader: Injecting process 7100 (thread 7048) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7100
2020-02-14 15:45:22,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7332
2020-02-14 15:45:22,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,217 [root] DEBUG: Loader: Injecting process 7332 (thread 7296) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7332
2020-02-14 15:45:22,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7332
2020-02-14 15:45:22,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,250 [root] DEBUG: Loader: Injecting process 7332 (thread 7296) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7332
2020-02-14 15:45:22,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7560
2020-02-14 15:45:22,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,265 [root] DEBUG: Loader: Injecting process 7560 (thread 7420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7560
2020-02-14 15:45:22,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7560
2020-02-14 15:45:22,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,296 [root] DEBUG: Loader: Injecting process 7560 (thread 7420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7560
2020-02-14 15:45:22,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7764
2020-02-14 15:45:22,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,312 [root] DEBUG: Loader: Injecting process 7764 (thread 7744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7764
2020-02-14 15:45:22,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7764
2020-02-14 15:45:22,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,342 [root] DEBUG: Loader: Injecting process 7764 (thread 7744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7764
2020-02-14 15:45:22,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7968
2020-02-14 15:45:22,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,358 [root] DEBUG: Loader: Injecting process 7968 (thread 8040) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7968
2020-02-14 15:45:22,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7968
2020-02-14 15:45:22,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,390 [root] DEBUG: Loader: Injecting process 7968 (thread 8040) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7968
2020-02-14 15:45:22,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6208
2020-02-14 15:45:22,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,405 [root] DEBUG: Loader: Injecting process 6208 (thread 5568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6208
2020-02-14 15:45:22,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6208
2020-02-14 15:45:22,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,437 [root] DEBUG: Loader: Injecting process 6208 (thread 5568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6208
2020-02-14 15:45:22,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6536
2020-02-14 15:45:22,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,453 [root] DEBUG: Loader: Injecting process 6536 (thread 6512) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6536
2020-02-14 15:45:22,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6536
2020-02-14 15:45:22,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,483 [root] DEBUG: Loader: Injecting process 6536 (thread 6512) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6536
2020-02-14 15:45:22,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6692
2020-02-14 15:45:22,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,592 [root] DEBUG: Loader: Injecting process 6692 (thread 6728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6692
2020-02-14 15:45:22,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6692
2020-02-14 15:45:22,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,625 [root] DEBUG: Loader: Injecting process 6692 (thread 6728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6692
2020-02-14 15:45:22,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6892
2020-02-14 15:45:22,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,640 [root] DEBUG: Loader: Injecting process 6892 (thread 2288) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6892
2020-02-14 15:45:22,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6892
2020-02-14 15:45:22,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,687 [root] DEBUG: Loader: Injecting process 6892 (thread 2288) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6892
2020-02-14 15:45:22,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7096
2020-02-14 15:45:22,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,703 [root] DEBUG: Loader: Injecting process 7096 (thread 7068) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7096
2020-02-14 15:45:22,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7096
2020-02-14 15:45:22,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,733 [root] DEBUG: Loader: Injecting process 7096 (thread 7068) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7096
2020-02-14 15:45:22,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7316
2020-02-14 15:45:22,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,750 [root] DEBUG: Loader: Injecting process 7316 (thread 7364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7316
2020-02-14 15:45:22,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7316
2020-02-14 15:45:22,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,780 [root] DEBUG: Loader: Injecting process 7316 (thread 7364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7316
2020-02-14 15:45:22,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7792
2020-02-14 15:45:22,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,796 [root] DEBUG: Loader: Injecting process 7792 (thread 7692) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7792
2020-02-14 15:45:22,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7792
2020-02-14 15:45:22,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,828 [root] DEBUG: Loader: Injecting process 7792 (thread 7692) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7792
2020-02-14 15:45:22,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7996
2020-02-14 15:45:22,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,890 [root] DEBUG: Loader: Injecting process 7996 (thread 7904) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7996
2020-02-14 15:45:22,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7996
2020-02-14 15:45:22,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,921 [root] DEBUG: Loader: Injecting process 7996 (thread 7904) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:22,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7996
2020-02-14 15:45:22,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6212
2020-02-14 15:45:22,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:22,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:22,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:22,967 [root] DEBUG: Loader: Injecting process 6212 (thread 8168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:22,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:22,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:22,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6212
2020-02-14 15:45:22,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6212
2020-02-14 15:45:22,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:23,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:23,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:23,000 [root] DEBUG: Loader: Injecting process 6212 (thread 8168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:23,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:23,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6212
2020-02-14 15:45:23,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6600
2020-02-14 15:45:23,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:23,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:23,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:23,015 [root] DEBUG: Loader: Injecting process 6600 (thread 6680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:23,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:23,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6600
2020-02-14 15:45:23,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6600
2020-02-14 15:45:23,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:23,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:23,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:23,046 [root] DEBUG: Loader: Injecting process 6600 (thread 6680) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:23,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:23,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6600
2020-02-14 15:45:23,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4712
2020-02-14 15:45:23,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:23,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:23,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:23,092 [root] DEBUG: Loader: Injecting process 4712 (thread 6700) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:23,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:23,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:23,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4712
2020-02-14 15:45:23,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4712
2020-02-14 15:45:24,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,296 [root] DEBUG: Loader: Injecting process 4712 (thread 6700) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4712
2020-02-14 15:45:24,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6932
2020-02-14 15:45:24,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,546 [root] DEBUG: Loader: Injecting process 6932 (thread 6936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6932
2020-02-14 15:45:24,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6932
2020-02-14 15:45:24,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,592 [root] DEBUG: Loader: Injecting process 6932 (thread 6936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6932
2020-02-14 15:45:24,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7288
2020-02-14 15:45:24,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,608 [root] DEBUG: Loader: Injecting process 7288 (thread 7276) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7288
2020-02-14 15:45:24,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7288
2020-02-14 15:45:24,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,625 [root] DEBUG: Loader: Injecting process 7288 (thread 7276) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7288
2020-02-14 15:45:24,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7644
2020-02-14 15:45:24,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,655 [root] DEBUG: Loader: Injecting process 7644 (thread 7772) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7644
2020-02-14 15:45:24,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7644
2020-02-14 15:45:24,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,687 [root] DEBUG: Loader: Injecting process 7644 (thread 7772) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7644
2020-02-14 15:45:24,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8172
2020-02-14 15:45:24,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,703 [root] DEBUG: Loader: Injecting process 8172 (thread 8160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8172
2020-02-14 15:45:24,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8172
2020-02-14 15:45:24,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,733 [root] DEBUG: Loader: Injecting process 8172 (thread 8160) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8172
2020-02-14 15:45:24,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6232
2020-02-14 15:45:24,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,750 [root] DEBUG: Loader: Injecting process 6232 (thread 6284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6232
2020-02-14 15:45:24,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6232
2020-02-14 15:45:24,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,780 [root] DEBUG: Loader: Injecting process 6232 (thread 6284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6232
2020-02-14 15:45:24,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5440
2020-02-14 15:45:24,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,812 [root] DEBUG: Loader: Injecting process 5440 (thread 5484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5440
2020-02-14 15:45:24,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5440
2020-02-14 15:45:24,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,842 [root] DEBUG: Loader: Injecting process 5440 (thread 5484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5440
2020-02-14 15:45:24,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6944
2020-02-14 15:45:24,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,875 [root] DEBUG: Loader: Injecting process 6944 (thread 6888) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6944
2020-02-14 15:45:24,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6944
2020-02-14 15:45:24,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,905 [root] DEBUG: Loader: Injecting process 6944 (thread 6888) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6944
2020-02-14 15:45:24,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7388
2020-02-14 15:45:24,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,953 [root] DEBUG: Loader: Injecting process 7388 (thread 7508) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:24,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7388
2020-02-14 15:45:24,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7388
2020-02-14 15:45:24,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:24,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:24,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:24,983 [root] DEBUG: Loader: Injecting process 7388 (thread 7508) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:24,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:24,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:24,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7388
2020-02-14 15:45:25,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7760
2020-02-14 15:45:25,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,000 [root] DEBUG: Loader: Injecting process 7760 (thread 5668) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7760
2020-02-14 15:45:25,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7760
2020-02-14 15:45:25,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,030 [root] DEBUG: Loader: Injecting process 7760 (thread 5668) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7760
2020-02-14 15:45:25,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8048
2020-02-14 15:45:25,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,046 [root] DEBUG: Loader: Injecting process 8048 (thread 8140) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8048
2020-02-14 15:45:25,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8048
2020-02-14 15:45:25,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,078 [root] DEBUG: Loader: Injecting process 8048 (thread 8140) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8048
2020-02-14 15:45:25,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6676
2020-02-14 15:45:25,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,108 [root] DEBUG: Loader: Injecting process 6676 (thread 6452) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6676
2020-02-14 15:45:25,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6676
2020-02-14 15:45:25,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,140 [root] DEBUG: Loader: Injecting process 6676 (thread 6452) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6676
2020-02-14 15:45:25,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1224
2020-02-14 15:45:25,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,187 [root] DEBUG: Loader: Injecting process 1224 (thread 4492) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1224
2020-02-14 15:45:25,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1224
2020-02-14 15:45:25,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,203 [root] DEBUG: Loader: Injecting process 1224 (thread 4492) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1224
2020-02-14 15:45:25,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7172
2020-02-14 15:45:25,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,233 [root] DEBUG: Loader: Injecting process 7172 (thread 7212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7172
2020-02-14 15:45:25,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7172
2020-02-14 15:45:25,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,655 [root] DEBUG: Loader: Injecting process 7172 (thread 7212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7172
2020-02-14 15:45:25,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7908
2020-02-14 15:45:25,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,671 [root] DEBUG: Loader: Injecting process 7908 (thread 7972) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7908
2020-02-14 15:45:25,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7908
2020-02-14 15:45:25,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,703 [root] DEBUG: Loader: Injecting process 7908 (thread 7972) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7908
2020-02-14 15:45:25,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6248
2020-02-14 15:45:25,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,733 [root] DEBUG: Loader: Injecting process 6248 (thread 6292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6248
2020-02-14 15:45:25,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6248
2020-02-14 15:45:25,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,765 [root] DEBUG: Loader: Injecting process 6248 (thread 6292) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6248
2020-02-14 15:45:25,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6828
2020-02-14 15:45:25,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,780 [root] DEBUG: Loader: Injecting process 6828 (thread 6840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6828
2020-02-14 15:45:25,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6828
2020-02-14 15:45:25,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,812 [root] DEBUG: Loader: Injecting process 6828 (thread 6840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6828
2020-02-14 15:45:25,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7360
2020-02-14 15:45:25,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,842 [root] DEBUG: Loader: Injecting process 7360 (thread 7308) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7360
2020-02-14 15:45:25,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7360
2020-02-14 15:45:25,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,875 [root] DEBUG: Loader: Injecting process 7360 (thread 7308) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:25,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7360
2020-02-14 15:45:25,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7612
2020-02-14 15:45:25,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:25,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:25,967 [root] DEBUG: Loader: Injecting process 7612 (thread 5672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:25,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:25,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:25,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7612
2020-02-14 15:45:25,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7612
2020-02-14 15:45:25,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:25,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,000 [root] DEBUG: Loader: Injecting process 7612 (thread 5672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:26,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7612
2020-02-14 15:45:26,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6304
2020-02-14 15:45:26,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,062 [root] DEBUG: Loader: Injecting process 6304 (thread 6420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:26,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6304
2020-02-14 15:45:26,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6304
2020-02-14 15:45:26,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,092 [root] DEBUG: Loader: Injecting process 6304 (thread 6420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:26,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6304
2020-02-14 15:45:26,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7036
2020-02-14 15:45:26,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,108 [root] DEBUG: Loader: Injecting process 7036 (thread 6696) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:26,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7036
2020-02-14 15:45:26,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7036
2020-02-14 15:45:26,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,140 [root] DEBUG: Loader: Injecting process 7036 (thread 6696) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:26,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7036
2020-02-14 15:45:26,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7800
2020-02-14 15:45:26,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,250 [root] DEBUG: Loader: Injecting process 7800 (thread 7584) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:26,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7800
2020-02-14 15:45:26,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7800
2020-02-14 15:45:26,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,358 [root] DEBUG: Loader: Injecting process 7800 (thread 7584) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:26,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7800
2020-02-14 15:45:26,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8132
2020-02-14 15:45:26,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,467 [root] DEBUG: Loader: Injecting process 8132 (thread 7836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:26,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8132
2020-02-14 15:45:26,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8132
2020-02-14 15:45:26,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,500 [root] DEBUG: Loader: Injecting process 8132 (thread 7836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:26,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8132
2020-02-14 15:45:26,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7284
2020-02-14 15:45:26,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:26,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:26,592 [root] DEBUG: Loader: Injecting process 7284 (thread 6616) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:26,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:26,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:26,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7284
2020-02-14 15:45:26,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7284
2020-02-14 15:45:26,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:26,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:27,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:27,062 [root] DEBUG: Loader: Injecting process 7284 (thread 6616) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:27,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:27,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:27,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:27,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:27,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7284
2020-02-14 15:45:28,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7616
2020-02-14 15:45:28,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,421 [root] DEBUG: Loader: Injecting process 7616 (thread 7804) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:28,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7616
2020-02-14 15:45:28,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7616
2020-02-14 15:45:28,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,530 [root] DEBUG: Loader: Injecting process 7616 (thread 7804) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:28,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7616
2020-02-14 15:45:28,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6604
2020-02-14 15:45:28,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,687 [root] DEBUG: Loader: Injecting process 6604 (thread 6348) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:28,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6604
2020-02-14 15:45:28,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6604
2020-02-14 15:45:28,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,796 [root] DEBUG: Loader: Injecting process 6604 (thread 6348) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:28,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6604
2020-02-14 15:45:28,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7264
2020-02-14 15:45:28,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,858 [root] DEBUG: Loader: Injecting process 7264 (thread 7500) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:28,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7264
2020-02-14 15:45:28,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7264
2020-02-14 15:45:28,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,875 [root] DEBUG: Loader: Injecting process 7264 (thread 7500) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:28,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7264
2020-02-14 15:45:28,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8088
2020-02-14 15:45:28,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,921 [root] DEBUG: Loader: Injecting process 8088 (thread 5096) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:28,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8088
2020-02-14 15:45:28,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8088
2020-02-14 15:45:28,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:28,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:28,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:28,983 [root] DEBUG: Loader: Injecting process 8088 (thread 5096) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:28,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:28,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:28,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8088
2020-02-14 15:45:29,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6708
2020-02-14 15:45:29,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:29,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:29,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:29,015 [root] DEBUG: Loader: Injecting process 6708 (thread 7672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:29,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:29,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6708
2020-02-14 15:45:29,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6708
2020-02-14 15:45:29,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:29,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:29,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:29,078 [root] DEBUG: Loader: Injecting process 6708 (thread 7672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:29,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:29,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6708
2020-02-14 15:45:29,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5436
2020-02-14 15:45:29,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:29,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:29,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:29,140 [root] DEBUG: Loader: Injecting process 5436 (thread 6556) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:29,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:29,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5436
2020-02-14 15:45:29,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5436
2020-02-14 15:45:29,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:29,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:29,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:29,171 [root] DEBUG: Loader: Injecting process 5436 (thread 6556) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:29,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:29,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:29,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5436
2020-02-14 15:45:29,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5736
2020-02-14 15:45:29,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:29,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:29,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:29,328 [root] DEBUG: Loader: Injecting process 5736 (thread 6152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:30,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:31,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:31,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5736
2020-02-14 15:45:31,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5736
2020-02-14 15:45:31,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:31,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:31,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:31,828 [root] DEBUG: Loader: Injecting process 5736 (thread 6152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:31,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:31,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5736
2020-02-14 15:45:31,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8104
2020-02-14 15:45:31,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:31,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:31,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:31,875 [root] DEBUG: Loader: Injecting process 8104 (thread 7144) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:31,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:31,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8104
2020-02-14 15:45:31,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8104
2020-02-14 15:45:31,921 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:31,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:31,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:31,953 [root] DEBUG: Loader: Injecting process 8104 (thread 7144) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:31,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:31,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8104
2020-02-14 15:45:31,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7164
2020-02-14 15:45:31,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:31,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:31,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:31,967 [root] DEBUG: Loader: Injecting process 7164 (thread 7568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:31,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:31,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:31,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7164
2020-02-14 15:45:31,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7164
2020-02-14 15:45:31,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:31,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,092 [root] DEBUG: Loader: Injecting process 7164 (thread 7568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:32,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7164
2020-02-14 15:45:32,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7220
2020-02-14 15:45:32,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,140 [root] DEBUG: Loader: Injecting process 7220 (thread 6744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:32,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7220
2020-02-14 15:45:32,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7220
2020-02-14 15:45:32,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,155 [root] DEBUG: Loader: Injecting process 7220 (thread 6744) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:32,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7220
2020-02-14 15:45:32,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6612
2020-02-14 15:45:32,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,328 [root] DEBUG: Loader: Injecting process 6612 (thread 5428) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:32,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6612
2020-02-14 15:45:32,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6612
2020-02-14 15:45:32,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,375 [root] DEBUG: Loader: Injecting process 6612 (thread 5428) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:32,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6612
2020-02-14 15:45:32,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8000
2020-02-14 15:45:32,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,437 [root] DEBUG: Loader: Injecting process 8000 (thread 7652) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:32,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8000
2020-02-14 15:45:32,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8000
2020-02-14 15:45:32,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,546 [root] DEBUG: Loader: Injecting process 8000 (thread 7652) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:32,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8000
2020-02-14 15:45:32,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7128
2020-02-14 15:45:32,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,578 [root] DEBUG: Loader: Injecting process 7128 (thread 6528) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:32,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7128
2020-02-14 15:45:32,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7128
2020-02-14 15:45:32,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,640 [root] DEBUG: Loader: Injecting process 7128 (thread 6528) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:32,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7128
2020-02-14 15:45:32,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8220
2020-02-14 15:45:32,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,671 [root] DEBUG: Loader: Injecting process 8220 (thread 8224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:32,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8220
2020-02-14 15:45:32,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8220
2020-02-14 15:45:32,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:32,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:32,703 [root] DEBUG: Loader: Injecting process 8220 (thread 8224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:32,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:32,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:32,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8220
2020-02-14 15:45:32,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8316
2020-02-14 15:45:32,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:32,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:33,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:34,000 [root] DEBUG: Loader: Injecting process 8316 (thread 8320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:34,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:34,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8316
2020-02-14 15:45:34,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8316
2020-02-14 15:45:34,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:34,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:34,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:34,875 [root] DEBUG: Loader: Injecting process 8316 (thread 8320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:34,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:34,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8316
2020-02-14 15:45:34,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8412
2020-02-14 15:45:34,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:34,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:34,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:34,967 [root] DEBUG: Loader: Injecting process 8412 (thread 8416) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:34,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:34,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:34,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8412
2020-02-14 15:45:35,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8412
2020-02-14 15:45:35,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,015 [root] DEBUG: Loader: Injecting process 8412 (thread 8416) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:35,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8412
2020-02-14 15:45:35,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8508
2020-02-14 15:45:35,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,062 [root] DEBUG: Loader: Injecting process 8508 (thread 8512) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:35,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8508
2020-02-14 15:45:35,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8508
2020-02-14 15:45:35,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,203 [root] DEBUG: Loader: Injecting process 8508 (thread 8512) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:35,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8508
2020-02-14 15:45:35,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8604
2020-02-14 15:45:35,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,405 [root] DEBUG: Loader: Injecting process 8604 (thread 8608) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:35,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8604
2020-02-14 15:45:35,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8604
2020-02-14 15:45:35,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,453 [root] DEBUG: Loader: Injecting process 8604 (thread 8608) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:35,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8604
2020-02-14 15:45:35,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8700
2020-02-14 15:45:35,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,500 [root] DEBUG: Loader: Injecting process 8700 (thread 8704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:35,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8700
2020-02-14 15:45:35,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8700
2020-02-14 15:45:35,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,530 [root] DEBUG: Loader: Injecting process 8700 (thread 8704) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:35,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8700
2020-02-14 15:45:35,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8796
2020-02-14 15:45:35,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,625 [root] DEBUG: Loader: Injecting process 8796 (thread 8800) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:35,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8796
2020-02-14 15:45:35,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8796
2020-02-14 15:45:35,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:35,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:35,733 [root] DEBUG: Loader: Injecting process 8796 (thread 8800) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:35,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:35,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:35,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8796
2020-02-14 15:45:35,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8892
2020-02-14 15:45:35,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:35,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:37,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:37,453 [root] DEBUG: Loader: Injecting process 8892 (thread 8896) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:37,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:37,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:37,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:37,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:37,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8892
2020-02-14 15:45:37,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8892
2020-02-14 15:45:37,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:37,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:37,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,203 [root] DEBUG: Loader: Injecting process 8892 (thread 8896) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:38,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8892
2020-02-14 15:45:38,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8988
2020-02-14 15:45:38,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:38,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,280 [root] DEBUG: Loader: Injecting process 8988 (thread 8992) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:38,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8988
2020-02-14 15:45:38,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8988
2020-02-14 15:45:38,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:38,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,375 [root] DEBUG: Loader: Injecting process 8988 (thread 8992) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:38,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8988
2020-02-14 15:45:38,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9084
2020-02-14 15:45:38,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:38,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,500 [root] DEBUG: Loader: Injecting process 9084 (thread 9088) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:38,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9084
2020-02-14 15:45:38,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9084
2020-02-14 15:45:38,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:38,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,578 [root] DEBUG: Loader: Injecting process 9084 (thread 9088) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:38,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9084
2020-02-14 15:45:38,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9180
2020-02-14 15:45:38,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:38,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,640 [root] DEBUG: Loader: Injecting process 9180 (thread 9184) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:38,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9180
2020-02-14 15:45:38,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9180
2020-02-14 15:45:38,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:38,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,703 [root] DEBUG: Loader: Injecting process 9180 (thread 9184) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:38,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9180
2020-02-14 15:45:38,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9276
2020-02-14 15:45:38,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:38,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:38,858 [root] DEBUG: Loader: Injecting process 9276 (thread 9280) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:38,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:38,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:38,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9276
2020-02-14 15:45:38,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9276
2020-02-14 15:45:38,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:38,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:39,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:39,046 [root] DEBUG: Loader: Injecting process 9276 (thread 9280) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:39,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:39,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:39,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:39,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:39,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9276
2020-02-14 15:45:39,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9372
2020-02-14 15:45:39,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:39,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:39,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:39,108 [root] DEBUG: Loader: Injecting process 9372 (thread 9376) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:39,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:39,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:39,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:39,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:39,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9372
2020-02-14 15:45:39,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9372
2020-02-14 15:45:39,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:39,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:40,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:40,203 [root] DEBUG: Loader: Injecting process 9372 (thread 9376) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:40,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:40,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:40,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:40,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:40,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9372
2020-02-14 15:45:40,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9468
2020-02-14 15:45:40,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:40,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:41,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:41,780 [root] DEBUG: Loader: Injecting process 9468 (thread 9472) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:41,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:41,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:41,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:41,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:41,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9468
2020-02-14 15:45:41,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9468
2020-02-14 15:45:41,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:41,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:41,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:42,015 [root] DEBUG: Loader: Injecting process 9468 (thread 9472) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:42,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:42,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:42,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:42,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:42,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9468
2020-02-14 15:45:42,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9568
2020-02-14 15:45:42,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:42,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:42,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:42,655 [root] DEBUG: Loader: Injecting process 9568 (thread 9572) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:42,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:42,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:42,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:42,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:42,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9568
2020-02-14 15:45:42,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9568
2020-02-14 15:45:42,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:42,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:44,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:44,578 [root] DEBUG: Loader: Injecting process 9568 (thread 9572) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:44,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:44,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:44,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:44,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:44,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9568
2020-02-14 15:45:45,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9668
2020-02-14 15:45:45,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,483 [root] DEBUG: Loader: Injecting process 9668 (thread 9672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:45,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9668
2020-02-14 15:45:45,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9668
2020-02-14 15:45:45,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,515 [root] DEBUG: Loader: Injecting process 9668 (thread 9672) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:45,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9668
2020-02-14 15:45:45,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9764
2020-02-14 15:45:45,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,546 [root] DEBUG: Loader: Injecting process 9764 (thread 9768) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:45,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9764
2020-02-14 15:45:45,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9764
2020-02-14 15:45:45,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,717 [root] DEBUG: Loader: Injecting process 9764 (thread 9768) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:45,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9764
2020-02-14 15:45:45,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9860
2020-02-14 15:45:45,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,765 [root] DEBUG: Loader: Injecting process 9860 (thread 9864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:45,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9860
2020-02-14 15:45:45,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9860
2020-02-14 15:45:45,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,796 [root] DEBUG: Loader: Injecting process 9860 (thread 9864) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:45,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9860
2020-02-14 15:45:45,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9956
2020-02-14 15:45:45,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,812 [root] DEBUG: Loader: Injecting process 9956 (thread 9960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:45,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9956
2020-02-14 15:45:45,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9956
2020-02-14 15:45:45,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,842 [root] DEBUG: Loader: Injecting process 9956 (thread 9960) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:45,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9956
2020-02-14 15:45:45,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10052
2020-02-14 15:45:45,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,858 [root] DEBUG: Loader: Injecting process 10052 (thread 10056) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:45,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10052
2020-02-14 15:45:45,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10052
2020-02-14 15:45:45,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,890 [root] DEBUG: Loader: Injecting process 10052 (thread 10056) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:45,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10052
2020-02-14 15:45:45,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10148
2020-02-14 15:45:45,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:45,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:45,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:45,967 [root] DEBUG: Loader: Injecting process 10148 (thread 10152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:45,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:45,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:45,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10148
2020-02-14 15:45:46,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10148
2020-02-14 15:45:46,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:46,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:46,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:46,000 [root] DEBUG: Loader: Injecting process 10148 (thread 10152) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:46,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:46,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10148
2020-02-14 15:45:46,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8196
2020-02-14 15:45:46,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:46,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:46,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:46,062 [root] DEBUG: Loader: Injecting process 8196 (thread 8200) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:46,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:46,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8196
2020-02-14 15:45:46,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8196
2020-02-14 15:45:46,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:46,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:46,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:46,092 [root] DEBUG: Loader: Injecting process 8196 (thread 8200) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:46,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:46,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8196
2020-02-14 15:45:46,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8280
2020-02-14 15:45:46,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:46,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:46,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:46,437 [root] DEBUG: Loader: Injecting process 8280 (thread 8284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:46,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:46,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:46,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8280
2020-02-14 15:45:46,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8280
2020-02-14 15:45:46,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:46,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:46,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:46,467 [root] DEBUG: Loader: Injecting process 8280 (thread 8284) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:48,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:48,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:48,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:48,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:48,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8280
2020-02-14 15:45:48,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8372
2020-02-14 15:45:48,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:48,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,000 [root] DEBUG: Loader: Injecting process 8372 (thread 8368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8372
2020-02-14 15:45:49,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8372
2020-02-14 15:45:49,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,030 [root] DEBUG: Loader: Injecting process 8372 (thread 8368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8372
2020-02-14 15:45:49,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8540
2020-02-14 15:45:49,108 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,125 [root] DEBUG: Loader: Injecting process 8540 (thread 8544) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8540
2020-02-14 15:45:49,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8540
2020-02-14 15:45:49,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,140 [root] DEBUG: Loader: Injecting process 8540 (thread 8544) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8540
2020-02-14 15:45:49,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8624
2020-02-14 15:45:49,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,187 [root] DEBUG: Loader: Injecting process 8624 (thread 8628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8624
2020-02-14 15:45:49,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8624
2020-02-14 15:45:49,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,203 [root] DEBUG: Loader: Injecting process 8624 (thread 8628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8624
2020-02-14 15:45:49,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8768
2020-02-14 15:45:49,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,233 [root] DEBUG: Loader: Injecting process 8768 (thread 8772) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8768
2020-02-14 15:45:49,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8768
2020-02-14 15:45:49,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,265 [root] DEBUG: Loader: Injecting process 8768 (thread 8772) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8768
2020-02-14 15:45:49,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8880
2020-02-14 15:45:49,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,280 [root] DEBUG: Loader: Injecting process 8880 (thread 8856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8880
2020-02-14 15:45:49,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8880
2020-02-14 15:45:49,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,312 [root] DEBUG: Loader: Injecting process 8880 (thread 8856) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8880
2020-02-14 15:45:49,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8956
2020-02-14 15:45:49,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,421 [root] DEBUG: Loader: Injecting process 8956 (thread 8980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8956
2020-02-14 15:45:49,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8956
2020-02-14 15:45:49,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,483 [root] DEBUG: Loader: Injecting process 8956 (thread 8980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8956
2020-02-14 15:45:49,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9080
2020-02-14 15:45:49,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,500 [root] DEBUG: Loader: Injecting process 9080 (thread 9112) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9080
2020-02-14 15:45:49,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9080
2020-02-14 15:45:49,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,530 [root] DEBUG: Loader: Injecting process 9080 (thread 9112) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9080
2020-02-14 15:45:49,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9220
2020-02-14 15:45:49,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,546 [root] DEBUG: Loader: Injecting process 9220 (thread 9224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9220
2020-02-14 15:45:49,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9220
2020-02-14 15:45:49,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,578 [root] DEBUG: Loader: Injecting process 9220 (thread 9224) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9220
2020-02-14 15:45:49,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9292
2020-02-14 15:45:49,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,592 [root] DEBUG: Loader: Injecting process 9292 (thread 9324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9292
2020-02-14 15:45:49,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9292
2020-02-14 15:45:49,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,625 [root] DEBUG: Loader: Injecting process 9292 (thread 9324) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9292
2020-02-14 15:45:49,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9448
2020-02-14 15:45:49,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,640 [root] DEBUG: Loader: Injecting process 9448 (thread 9452) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9448
2020-02-14 15:45:49,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9448
2020-02-14 15:45:49,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,671 [root] DEBUG: Loader: Injecting process 9448 (thread 9452) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9448
2020-02-14 15:45:49,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9536
2020-02-14 15:45:49,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,687 [root] DEBUG: Loader: Injecting process 9536 (thread 9560) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9536
2020-02-14 15:45:49,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9536
2020-02-14 15:45:49,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,750 [root] DEBUG: Loader: Injecting process 9536 (thread 9560) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9536
2020-02-14 15:45:49,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9624
2020-02-14 15:45:49,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,765 [root] DEBUG: Loader: Injecting process 9624 (thread 9620) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9624
2020-02-14 15:45:49,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9624
2020-02-14 15:45:49,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,796 [root] DEBUG: Loader: Injecting process 9624 (thread 9620) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:49,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9624
2020-02-14 15:45:49,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9796
2020-02-14 15:45:49,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:49,967 [root] DEBUG: Loader: Injecting process 9796 (thread 9800) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:49,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:49,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:49,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9796
2020-02-14 15:45:49,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9796
2020-02-14 15:45:49,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:49,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:49,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:51,062 [root] DEBUG: Loader: Injecting process 9796 (thread 9800) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:51,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:51,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:51,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:51,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:51,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9796
2020-02-14 15:45:51,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9880
2020-02-14 15:45:52,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,046 [root] DEBUG: Loader: Injecting process 9880 (thread 9884) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9880
2020-02-14 15:45:52,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9880
2020-02-14 15:45:52,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,062 [root] DEBUG: Loader: Injecting process 9880 (thread 9884) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9880
2020-02-14 15:45:52,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10024
2020-02-14 15:45:52,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,125 [root] DEBUG: Loader: Injecting process 10024 (thread 10028) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10024
2020-02-14 15:45:52,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10024
2020-02-14 15:45:52,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,155 [root] DEBUG: Loader: Injecting process 10024 (thread 10028) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10024
2020-02-14 15:45:52,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10136
2020-02-14 15:45:52,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,203 [root] DEBUG: Loader: Injecting process 10136 (thread 10112) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10136
2020-02-14 15:45:52,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10136
2020-02-14 15:45:52,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,233 [root] DEBUG: Loader: Injecting process 10136 (thread 10112) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10136
2020-02-14 15:45:52,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10204
2020-02-14 15:45:52,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,265 [root] DEBUG: Loader: Injecting process 10204 (thread 10236) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10204
2020-02-14 15:45:52,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10204
2020-02-14 15:45:52,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,296 [root] DEBUG: Loader: Injecting process 10204 (thread 10236) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10204
2020-02-14 15:45:52,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8352
2020-02-14 15:45:52,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,375 [root] DEBUG: Loader: Injecting process 8352 (thread 8356) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8352
2020-02-14 15:45:52,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8352
2020-02-14 15:45:52,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,405 [root] DEBUG: Loader: Injecting process 8352 (thread 8356) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8352
2020-02-14 15:45:52,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8460
2020-02-14 15:45:52,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,421 [root] DEBUG: Loader: Injecting process 8460 (thread 8448) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8460
2020-02-14 15:45:52,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8460
2020-02-14 15:45:52,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,453 [root] DEBUG: Loader: Injecting process 8460 (thread 8448) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8460
2020-02-14 15:45:52,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8592
2020-02-14 15:45:52,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,467 [root] DEBUG: Loader: Injecting process 8592 (thread 8560) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8592
2020-02-14 15:45:52,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8592
2020-02-14 15:45:52,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,500 [root] DEBUG: Loader: Injecting process 8592 (thread 8560) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8592
2020-02-14 15:45:52,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8720
2020-02-14 15:45:52,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,515 [root] DEBUG: Loader: Injecting process 8720 (thread 8724) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8720
2020-02-14 15:45:52,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8720
2020-02-14 15:45:52,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,578 [root] DEBUG: Loader: Injecting process 8720 (thread 8724) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8720
2020-02-14 15:45:52,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8832
2020-02-14 15:45:52,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,608 [root] DEBUG: Loader: Injecting process 8832 (thread 8836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8832
2020-02-14 15:45:52,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8832
2020-02-14 15:45:52,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,640 [root] DEBUG: Loader: Injecting process 8832 (thread 8836) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8832
2020-02-14 15:45:52,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9024
2020-02-14 15:45:52,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,655 [root] DEBUG: Loader: Injecting process 9024 (thread 9028) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9024
2020-02-14 15:45:52,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9024
2020-02-14 15:45:52,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,717 [root] DEBUG: Loader: Injecting process 9024 (thread 9028) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9024
2020-02-14 15:45:52,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9156
2020-02-14 15:45:52,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,780 [root] DEBUG: Loader: Injecting process 9156 (thread 9128) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9156
2020-02-14 15:45:52,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9156
2020-02-14 15:45:52,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,812 [root] DEBUG: Loader: Injecting process 9156 (thread 9128) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9156
2020-02-14 15:45:52,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9244
2020-02-14 15:45:52,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,858 [root] DEBUG: Loader: Injecting process 9244 (thread 9304) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9244
2020-02-14 15:45:52,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9244
2020-02-14 15:45:52,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,890 [root] DEBUG: Loader: Injecting process 9244 (thread 9304) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9244
2020-02-14 15:45:52,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9388
2020-02-14 15:45:52,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,953 [root] DEBUG: Loader: Injecting process 9388 (thread 9420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:52,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9388
2020-02-14 15:45:52,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9388
2020-02-14 15:45:52,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:52,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:52,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:52,983 [root] DEBUG: Loader: Injecting process 9388 (thread 9420) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:52,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:52,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:52,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9388
2020-02-14 15:45:53,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9512
2020-02-14 15:45:53,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:53,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:53,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:53,812 [root] DEBUG: Loader: Injecting process 9512 (thread 9488) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:53,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:53,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9512
2020-02-14 15:45:53,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9512
2020-02-14 15:45:53,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:53,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:53,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:53,967 [root] DEBUG: Loader: Injecting process 9512 (thread 9488) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:53,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:53,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9512
2020-02-14 15:45:53,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9712
2020-02-14 15:45:53,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:53,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:53,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:53,983 [root] DEBUG: Loader: Injecting process 9712 (thread 9688) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:53,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:53,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:53,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9712
2020-02-14 15:45:54,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9712
2020-02-14 15:45:54,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,015 [root] DEBUG: Loader: Injecting process 9712 (thread 9688) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9712
2020-02-14 15:45:54,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9844
2020-02-14 15:45:54,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,030 [root] DEBUG: Loader: Injecting process 9844 (thread 9788) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9844
2020-02-14 15:45:54,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9844
2020-02-14 15:45:54,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,062 [root] DEBUG: Loader: Injecting process 9844 (thread 9788) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9844
2020-02-14 15:45:54,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9916
2020-02-14 15:45:54,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,078 [root] DEBUG: Loader: Injecting process 9916 (thread 9992) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9916
2020-02-14 15:45:54,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9916
2020-02-14 15:45:54,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,108 [root] DEBUG: Loader: Injecting process 9916 (thread 9992) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9916
2020-02-14 15:45:54,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10120
2020-02-14 15:45:54,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,125 [root] DEBUG: Loader: Injecting process 10120 (thread 10124) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10120
2020-02-14 15:45:54,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10120
2020-02-14 15:45:54,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,155 [root] DEBUG: Loader: Injecting process 10120 (thread 10124) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,155 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10120
2020-02-14 15:45:54,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10172
2020-02-14 15:45:54,171 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,217 [root] DEBUG: Loader: Injecting process 10172 (thread 10196) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10172
2020-02-14 15:45:54,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10172
2020-02-14 15:45:54,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,250 [root] DEBUG: Loader: Injecting process 10172 (thread 10196) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,250 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10172
2020-02-14 15:45:54,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8308
2020-02-14 15:45:54,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,265 [root] DEBUG: Loader: Injecting process 8308 (thread 8388) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8308
2020-02-14 15:45:54,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8308
2020-02-14 15:45:54,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,296 [root] DEBUG: Loader: Injecting process 8308 (thread 8388) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8308
2020-02-14 15:45:54,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8496
2020-02-14 15:45:54,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,312 [root] DEBUG: Loader: Injecting process 8496 (thread 8472) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8496
2020-02-14 15:45:54,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8496
2020-02-14 15:45:54,328 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,342 [root] DEBUG: Loader: Injecting process 8496 (thread 8472) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8496
2020-02-14 15:45:54,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8684
2020-02-14 15:45:54,358 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,358 [root] DEBUG: Loader: Injecting process 8684 (thread 8676) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8684
2020-02-14 15:45:54,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8684
2020-02-14 15:45:54,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,390 [root] DEBUG: Loader: Injecting process 8684 (thread 8676) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8684
2020-02-14 15:45:54,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8864
2020-02-14 15:45:54,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,437 [root] DEBUG: Loader: Injecting process 8864 (thread 8868) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8864
2020-02-14 15:45:54,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8864
2020-02-14 15:45:54,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,467 [root] DEBUG: Loader: Injecting process 8864 (thread 8868) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8864
2020-02-14 15:45:54,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8960
2020-02-14 15:45:54,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,483 [root] DEBUG: Loader: Injecting process 8960 (thread 3168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8960
2020-02-14 15:45:54,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8960
2020-02-14 15:45:54,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,515 [root] DEBUG: Loader: Injecting process 8960 (thread 3168) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,515 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8960
2020-02-14 15:45:54,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9136
2020-02-14 15:45:54,530 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,530 [root] DEBUG: Loader: Injecting process 9136 (thread 9176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9136
2020-02-14 15:45:54,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9136
2020-02-14 15:45:54,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,546 [root] DEBUG: Loader: Injecting process 9136 (thread 9176) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9136
2020-02-14 15:45:54,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9300
2020-02-14 15:45:54,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,608 [root] DEBUG: Loader: Injecting process 9300 (thread 9320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9300
2020-02-14 15:45:54,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9300
2020-02-14 15:45:54,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,625 [root] DEBUG: Loader: Injecting process 9300 (thread 9320) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9300
2020-02-14 15:45:54,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9504
2020-02-14 15:45:54,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,655 [root] DEBUG: Loader: Injecting process 9504 (thread 9484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9504
2020-02-14 15:45:54,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9504
2020-02-14 15:45:54,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,687 [root] DEBUG: Loader: Injecting process 9504 (thread 9484) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9504
2020-02-14 15:45:54,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9616
2020-02-14 15:45:54,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,703 [root] DEBUG: Loader: Injecting process 9616 (thread 2796) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,703 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9616
2020-02-14 15:45:54,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9616
2020-02-14 15:45:54,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,733 [root] DEBUG: Loader: Injecting process 9616 (thread 2796) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,733 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9616
2020-02-14 15:45:54,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9720
2020-02-14 15:45:54,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,750 [root] DEBUG: Loader: Injecting process 9720 (thread 9748) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9720
2020-02-14 15:45:54,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9720
2020-02-14 15:45:54,780 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,780 [root] DEBUG: Loader: Injecting process 9720 (thread 9748) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9720
2020-02-14 15:45:54,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9988
2020-02-14 15:45:54,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,796 [root] DEBUG: Loader: Injecting process 9988 (thread 9948) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:54,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9988
2020-02-14 15:45:54,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9988
2020-02-14 15:45:54,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:54,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:54,858 [root] DEBUG: Loader: Injecting process 9988 (thread 9948) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:54,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:54,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:54,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9988
2020-02-14 15:45:54,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10188
2020-02-14 15:45:54,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:54,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,405 [root] DEBUG: Loader: Injecting process 10188 (thread 10092) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:55,562 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10188
2020-02-14 15:45:55,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10188
2020-02-14 15:45:55,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,608 [root] DEBUG: Loader: Injecting process 10188 (thread 10092) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:55,608 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10188
2020-02-14 15:45:55,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8236
2020-02-14 15:45:55,625 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,625 [root] DEBUG: Loader: Injecting process 8236 (thread 8300) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:55,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8236
2020-02-14 15:45:55,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8236
2020-02-14 15:45:55,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,655 [root] DEBUG: Loader: Injecting process 8236 (thread 8300) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:55,655 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8236
2020-02-14 15:45:55,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8464
2020-02-14 15:45:55,671 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,671 [root] DEBUG: Loader: Injecting process 8464 (thread 8468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:55,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8464
2020-02-14 15:45:55,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8464
2020-02-14 15:45:55,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,750 [root] DEBUG: Loader: Injecting process 8464 (thread 8468) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:55,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8464
2020-02-14 15:45:55,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8504
2020-02-14 15:45:55,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,780 [root] DEBUG: Loader: Injecting process 8504 (thread 8524) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:55,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8504
2020-02-14 15:45:55,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8504
2020-02-14 15:45:55,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,812 [root] DEBUG: Loader: Injecting process 8504 (thread 8524) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:55,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8504
2020-02-14 15:45:55,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8816
2020-02-14 15:45:55,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,828 [root] DEBUG: Loader: Injecting process 8816 (thread 8928) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:55,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8816
2020-02-14 15:45:55,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8816
2020-02-14 15:45:55,842 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,858 [root] DEBUG: Loader: Injecting process 8816 (thread 8928) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:55,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8816
2020-02-14 15:45:55,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9012
2020-02-14 15:45:55,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,875 [root] DEBUG: Loader: Injecting process 9012 (thread 8984) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:55,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9012
2020-02-14 15:45:55,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9012
2020-02-14 15:45:55,905 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,905 [root] DEBUG: Loader: Injecting process 9012 (thread 8984) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:55,905 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9012
2020-02-14 15:45:55,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9240
2020-02-14 15:45:55,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,937 [root] DEBUG: Loader: Injecting process 9240 (thread 9212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:55,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9240
2020-02-14 15:45:55,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9240
2020-02-14 15:45:55,967 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:55,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:55,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:55,983 [root] DEBUG: Loader: Injecting process 9240 (thread 9212) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:55,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:55,983 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:55,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9240
2020-02-14 15:45:56,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9500
2020-02-14 15:45:56,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,000 [root] DEBUG: Loader: Injecting process 9500 (thread 9404) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9500
2020-02-14 15:45:56,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9500
2020-02-14 15:45:56,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,030 [root] DEBUG: Loader: Injecting process 9500 (thread 9404) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9500
2020-02-14 15:45:56,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9592
2020-02-14 15:45:56,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,046 [root] DEBUG: Loader: Injecting process 9592 (thread 9596) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9592
2020-02-14 15:45:56,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9592
2020-02-14 15:45:56,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,078 [root] DEBUG: Loader: Injecting process 9592 (thread 9596) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9592
2020-02-14 15:45:56,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9852
2020-02-14 15:45:56,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,108 [root] DEBUG: Loader: Injecting process 9852 (thread 9820) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,108 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9852
2020-02-14 15:45:56,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9852
2020-02-14 15:45:56,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,140 [root] DEBUG: Loader: Injecting process 9852 (thread 9820) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9852
2020-02-14 15:45:56,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10040
2020-02-14 15:45:56,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,171 [root] DEBUG: Loader: Injecting process 10040 (thread 9980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10040
2020-02-14 15:45:56,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10040
2020-02-14 15:45:56,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,187 [root] DEBUG: Loader: Injecting process 10040 (thread 9980) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10040
2020-02-14 15:45:56,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10104
2020-02-14 15:45:56,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,217 [root] DEBUG: Loader: Injecting process 10104 (thread 8256) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10104
2020-02-14 15:45:56,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10104
2020-02-14 15:45:56,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,265 [root] DEBUG: Loader: Injecting process 10104 (thread 8256) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10104
2020-02-14 15:45:56,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8456
2020-02-14 15:45:56,296 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,296 [root] DEBUG: Loader: Injecting process 8456 (thread 2044) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,296 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8456
2020-02-14 15:45:56,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8456
2020-02-14 15:45:56,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,328 [root] DEBUG: Loader: Injecting process 8456 (thread 2044) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,328 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8456
2020-02-14 15:45:56,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8528
2020-02-14 15:45:56,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,342 [root] DEBUG: Loader: Injecting process 8528 (thread 8580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8528
2020-02-14 15:45:56,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8528
2020-02-14 15:45:56,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,375 [root] DEBUG: Loader: Injecting process 8528 (thread 8580) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8528
2020-02-14 15:45:56,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8852
2020-02-14 15:45:56,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,390 [root] DEBUG: Loader: Injecting process 8852 (thread 8760) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8852
2020-02-14 15:45:56,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8852
2020-02-14 15:45:56,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,437 [root] DEBUG: Loader: Injecting process 8852 (thread 8760) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8852
2020-02-14 15:45:56,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9108
2020-02-14 15:45:56,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,467 [root] DEBUG: Loader: Injecting process 9108 (thread 9100) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,467 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9108
2020-02-14 15:45:56,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9108
2020-02-14 15:45:56,483 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,483 [root] DEBUG: Loader: Injecting process 9108 (thread 9100) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9108
2020-02-14 15:45:56,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9352
2020-02-14 15:45:56,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,500 [root] DEBUG: Loader: Injecting process 9352 (thread 9356) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9352
2020-02-14 15:45:56,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9352
2020-02-14 15:45:56,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,515 [root] DEBUG: Loader: Injecting process 9352 (thread 9356) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9352
2020-02-14 15:45:56,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9604
2020-02-14 15:45:56,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,546 [root] DEBUG: Loader: Injecting process 9604 (thread 9628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:56,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9604
2020-02-14 15:45:56,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9604
2020-02-14 15:45:56,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:56,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:56,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:56,953 [root] DEBUG: Loader: Injecting process 9604 (thread 9628) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:56,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:56,953 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:56,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9604
2020-02-14 15:45:56,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9744
2020-02-14 15:45:57,000 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,000 [root] DEBUG: Loader: Injecting process 9744 (thread 9740) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9744
2020-02-14 15:45:57,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9744
2020-02-14 15:45:57,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,030 [root] DEBUG: Loader: Injecting process 9744 (thread 9740) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9744
2020-02-14 15:45:57,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10100
2020-02-14 15:45:57,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,046 [root] DEBUG: Loader: Injecting process 10100 (thread 10132) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10100
2020-02-14 15:45:57,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10100
2020-02-14 15:45:57,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,078 [root] DEBUG: Loader: Injecting process 10100 (thread 10132) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10100
2020-02-14 15:45:57,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8252
2020-02-14 15:45:57,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,092 [root] DEBUG: Loader: Injecting process 8252 (thread 6216) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8252
2020-02-14 15:45:57,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8252
2020-02-14 15:45:57,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,125 [root] DEBUG: Loader: Injecting process 8252 (thread 6216) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8252
2020-02-14 15:45:57,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8536
2020-02-14 15:45:57,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,140 [root] DEBUG: Loader: Injecting process 8536 (thread 8568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8536
2020-02-14 15:45:57,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8536
2020-02-14 15:45:57,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,171 [root] DEBUG: Loader: Injecting process 8536 (thread 8568) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8536
2020-02-14 15:45:57,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8696
2020-02-14 15:45:57,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,187 [root] DEBUG: Loader: Injecting process 8696 (thread 8716) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8696
2020-02-14 15:45:57,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8696
2020-02-14 15:45:57,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,265 [root] DEBUG: Loader: Injecting process 8696 (thread 8716) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,265 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8696
2020-02-14 15:45:57,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9048
2020-02-14 15:45:57,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,358 [root] DEBUG: Loader: Injecting process 9048 (thread 8936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9048
2020-02-14 15:45:57,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9048
2020-02-14 15:45:57,390 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,390 [root] DEBUG: Loader: Injecting process 9048 (thread 8936) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9048
2020-02-14 15:45:57,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9328
2020-02-14 15:45:57,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,405 [root] DEBUG: Loader: Injecting process 9328 (thread 9368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9328
2020-02-14 15:45:57,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9328
2020-02-14 15:45:57,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,437 [root] DEBUG: Loader: Injecting process 9328 (thread 9368) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9328
2020-02-14 15:45:57,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9632
2020-02-14 15:45:57,453 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,453 [root] DEBUG: Loader: Injecting process 9632 (thread 9436) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9632
2020-02-14 15:45:57,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9632
2020-02-14 15:45:57,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,483 [root] DEBUG: Loader: Injecting process 9632 (thread 9436) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9632
2020-02-14 15:45:57,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9828
2020-02-14 15:45:57,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,500 [root] DEBUG: Loader: Injecting process 9828 (thread 10008) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9828
2020-02-14 15:45:57,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9828
2020-02-14 15:45:57,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,530 [root] DEBUG: Loader: Injecting process 9828 (thread 10008) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,530 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9828
2020-02-14 15:45:57,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10144
2020-02-14 15:45:57,546 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,546 [root] DEBUG: Loader: Injecting process 10144 (thread 7356) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10144
2020-02-14 15:45:57,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10144
2020-02-14 15:45:57,562 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,578 [root] DEBUG: Loader: Injecting process 10144 (thread 7356) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10144
2020-02-14 15:45:57,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8244
2020-02-14 15:45:57,592 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,592 [root] DEBUG: Loader: Injecting process 8244 (thread 8240) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,592 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8244
2020-02-14 15:45:57,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8244
2020-02-14 15:45:57,608 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,625 [root] DEBUG: Loader: Injecting process 8244 (thread 8240) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8244
2020-02-14 15:45:57,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8844
2020-02-14 15:45:57,640 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,640 [root] DEBUG: Loader: Injecting process 8844 (thread 8888) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,640 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8844
2020-02-14 15:45:57,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8844
2020-02-14 15:45:57,655 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,671 [root] DEBUG: Loader: Injecting process 8844 (thread 8888) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,671 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8844
2020-02-14 15:45:57,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9056
2020-02-14 15:45:57,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,687 [root] DEBUG: Loader: Injecting process 9056 (thread 9264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9056
2020-02-14 15:45:57,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9056
2020-02-14 15:45:57,703 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,717 [root] DEBUG: Loader: Injecting process 9056 (thread 9264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,717 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9056
2020-02-14 15:45:57,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9516
2020-02-14 15:45:57,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,842 [root] DEBUG: Loader: Injecting process 9516 (thread 9460) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9516
2020-02-14 15:45:57,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9516
2020-02-14 15:45:57,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,875 [root] DEBUG: Loader: Injecting process 9516 (thread 9460) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9516
2020-02-14 15:45:57,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9848
2020-02-14 15:45:57,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,921 [root] DEBUG: Loader: Injecting process 9848 (thread 9900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:57,921 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9848
2020-02-14 15:45:57,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9848
2020-02-14 15:45:57,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:57,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:57,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:57,937 [root] DEBUG: Loader: Injecting process 9848 (thread 9900) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:57,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:57,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:57,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9848
2020-02-14 15:45:58,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10180
2020-02-14 15:45:58,250 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,358 [root] DEBUG: Loader: Injecting process 10180 (thread 10232) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:58,358 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10180
2020-02-14 15:45:58,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10180
2020-02-14 15:45:58,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,390 [root] DEBUG: Loader: Injecting process 10180 (thread 10232) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:58,390 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10180
2020-02-14 15:45:58,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8484
2020-02-14 15:45:58,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,405 [root] DEBUG: Loader: Injecting process 8484 (thread 8488) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:58,405 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8484
2020-02-14 15:45:58,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8484
2020-02-14 15:45:58,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,421 [root] DEBUG: Loader: Injecting process 8484 (thread 8488) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:58,437 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8484
2020-02-14 15:45:58,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9020
2020-02-14 15:45:58,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,765 [root] DEBUG: Loader: Injecting process 9020 (thread 8788) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:58,780 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9020
2020-02-14 15:45:58,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9020
2020-02-14 15:45:58,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,796 [root] DEBUG: Loader: Injecting process 9020 (thread 8788) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:58,796 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9020
2020-02-14 15:45:58,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9228
2020-02-14 15:45:58,812 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,812 [root] DEBUG: Loader: Injecting process 9228 (thread 9400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:58,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9228
2020-02-14 15:45:58,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9228
2020-02-14 15:45:58,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,828 [root] DEBUG: Loader: Injecting process 9228 (thread 9400) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:58,842 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9228
2020-02-14 15:45:58,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9792
2020-02-14 15:45:58,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:58,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:58,858 [root] DEBUG: Loader: Injecting process 9792 (thread 9940) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:58,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:58,858 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:58,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9792
2020-02-14 15:45:58,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9792
2020-02-14 15:45:58,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:58,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,015 [root] DEBUG: Loader: Injecting process 9792 (thread 9940) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:59,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9792
2020-02-14 15:45:59,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9924
2020-02-14 15:45:59,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,046 [root] DEBUG: Loader: Injecting process 9924 (thread 9928) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:59,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9924
2020-02-14 15:45:59,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9924
2020-02-14 15:45:59,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,078 [root] DEBUG: Loader: Injecting process 9924 (thread 9928) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:59,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9924
2020-02-14 15:45:59,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8556
2020-02-14 15:45:59,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,233 [root] DEBUG: Loader: Injecting process 8556 (thread 8668) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:59,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8556
2020-02-14 15:45:59,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8556
2020-02-14 15:45:59,421 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,608 [root] DEBUG: Loader: Injecting process 8556 (thread 8668) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:59,625 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8556
2020-02-14 15:45:59,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8764
2020-02-14 15:45:59,687 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,687 [root] DEBUG: Loader: Injecting process 8764 (thread 8840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:59,687 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8764
2020-02-14 15:45:59,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8764
2020-02-14 15:45:59,717 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,765 [root] DEBUG: Loader: Injecting process 8764 (thread 8840) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:59,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8764
2020-02-14 15:45:59,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9508
2020-02-14 15:45:59,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,812 [root] DEBUG: Loader: Injecting process 9508 (thread 9728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:45:59,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9508
2020-02-14 15:45:59,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9508
2020-02-14 15:45:59,875 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:45:59,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:45:59,875 [root] DEBUG: Loader: Injecting process 9508 (thread 9728) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:45:59,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:45:59,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:45:59,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9508
2020-02-14 15:45:59,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10108
2020-02-14 15:45:59,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:45:59,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,000 [root] DEBUG: Loader: Injecting process 10108 (thread 10076) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,015 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10108
2020-02-14 15:46:00,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10108
2020-02-14 15:46:00,030 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,030 [root] DEBUG: Loader: Injecting process 10108 (thread 10076) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10108
2020-02-14 15:46:00,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8332
2020-02-14 15:46:00,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,062 [root] DEBUG: Loader: Injecting process 8332 (thread 8264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,062 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8332
2020-02-14 15:46:00,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8332
2020-02-14 15:46:00,078 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,155 [root] DEBUG: Loader: Injecting process 8332 (thread 8264) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8332
2020-02-14 15:46:00,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9236
2020-02-14 15:46:00,203 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,203 [root] DEBUG: Loader: Injecting process 9236 (thread 9296) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,203 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9236
2020-02-14 15:46:00,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9236
2020-02-14 15:46:00,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,233 [root] DEBUG: Loader: Injecting process 9236 (thread 9296) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9236
2020-02-14 15:46:00,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9640
2020-02-14 15:46:00,280 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,280 [root] DEBUG: Loader: Injecting process 9640 (thread 9832) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9640
2020-02-14 15:46:00,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9640
2020-02-14 15:46:00,312 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,312 [root] DEBUG: Loader: Injecting process 9640 (thread 9832) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,312 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9640
2020-02-14 15:46:00,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9824
2020-02-14 15:46:00,342 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,342 [root] DEBUG: Loader: Injecting process 9824 (thread 8260) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,342 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9824
2020-02-14 15:46:00,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9824
2020-02-14 15:46:00,375 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,375 [root] DEBUG: Loader: Injecting process 9824 (thread 8260) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,375 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9824
2020-02-14 15:46:00,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9160
2020-02-14 15:46:00,405 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,421 [root] DEBUG: Loader: Injecting process 9160 (thread 8748) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,421 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9160
2020-02-14 15:46:00,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9160
2020-02-14 15:46:00,437 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,453 [root] DEBUG: Loader: Injecting process 9160 (thread 8748) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,453 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9160
2020-02-14 15:46:00,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9424
2020-02-14 15:46:00,467 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,467 [root] DEBUG: Loader: Injecting process 9424 (thread 9044) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,483 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9424
2020-02-14 15:46:00,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9424
2020-02-14 15:46:00,500 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,500 [root] DEBUG: Loader: Injecting process 9424 (thread 9044) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,500 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9424
2020-02-14 15:46:00,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8212
2020-02-14 15:46:00,515 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,515 [root] DEBUG: Loader: Injecting process 8212 (thread 8268) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,546 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8212
2020-02-14 15:46:00,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8212
2020-02-14 15:46:00,578 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,578 [root] DEBUG: Loader: Injecting process 8212 (thread 8268) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,578 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8212
2020-02-14 15:46:00,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9252
2020-02-14 15:46:00,733 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,733 [root] DEBUG: Loader: Injecting process 9252 (thread 2504) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,750 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9252
2020-02-14 15:46:00,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9252
2020-02-14 15:46:00,765 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,765 [root] DEBUG: Loader: Injecting process 9252 (thread 2504) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,765 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9252
2020-02-14 15:46:00,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9888
2020-02-14 15:46:00,796 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,796 [root] DEBUG: Loader: Injecting process 9888 (thread 9932) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,812 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9888
2020-02-14 15:46:00,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9888
2020-02-14 15:46:00,828 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,828 [root] DEBUG: Loader: Injecting process 9888 (thread 9932) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,828 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9888
2020-02-14 15:46:00,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9072
2020-02-14 15:46:00,858 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,858 [root] DEBUG: Loader: Injecting process 9072 (thread 9132) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,875 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9072
2020-02-14 15:46:00,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9072
2020-02-14 15:46:00,890 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,890 [root] DEBUG: Loader: Injecting process 9072 (thread 9132) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,890 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9072
2020-02-14 15:46:00,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9140
2020-02-14 15:46:00,937 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,937 [root] DEBUG: Loader: Injecting process 9140 (thread 9340) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:00,937 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9140
2020-02-14 15:46:00,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9140
2020-02-14 15:46:00,953 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:00,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:00,967 [root] DEBUG: Loader: Injecting process 9140 (thread 9340) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:00,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:00,967 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:00,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9140
2020-02-14 15:46:00,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9216
2020-02-14 15:46:00,983 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:00,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,000 [root] DEBUG: Loader: Injecting process 9216 (thread 9364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:01,000 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9216
2020-02-14 15:46:01,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9216
2020-02-14 15:46:01,015 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,015 [root] DEBUG: Loader: Injecting process 9216 (thread 9364) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:01,030 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9216
2020-02-14 15:46:01,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9976
2020-02-14 15:46:01,046 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,046 [root] DEBUG: Loader: Injecting process 9976 (thread 10164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:01,046 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9976
2020-02-14 15:46:01,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9976
2020-02-14 15:46:01,062 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,078 [root] DEBUG: Loader: Injecting process 9976 (thread 10164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:01,078 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9976
2020-02-14 15:46:01,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9896
2020-02-14 15:46:01,092 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,092 [root] DEBUG: Loader: Injecting process 9896 (thread 9164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:01,092 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9896
2020-02-14 15:46:01,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9896
2020-02-14 15:46:01,125 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,125 [root] DEBUG: Loader: Injecting process 9896 (thread 9164) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:01,125 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9896
2020-02-14 15:46:01,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9892
2020-02-14 15:46:01,140 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,140 [root] DEBUG: Loader: Injecting process 9892 (thread 8500) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:01,140 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9892
2020-02-14 15:46:01,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9892
2020-02-14 15:46:01,155 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,171 [root] DEBUG: Loader: Injecting process 9892 (thread 8500) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:01,171 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9892
2020-02-14 15:46:01,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8692
2020-02-14 15:46:01,187 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,187 [root] DEBUG: Loader: Injecting process 8692 (thread 8660) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:01,187 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8692
2020-02-14 15:46:01,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8692
2020-02-14 15:46:01,217 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,217 [root] DEBUG: Loader: Injecting process 8692 (thread 8660) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:01,217 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8692
2020-02-14 15:46:01,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9332
2020-02-14 15:46:01,233 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,233 [root] DEBUG: Loader: Injecting process 9332 (thread 10068) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:46:01,233 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9332
2020-02-14 15:46:01,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9332
2020-02-14 15:46:01,265 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor
2020-02-14 15:46:01,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\qxodz\dll\MGVrkB.dll, loader C:\qxodz\bin\GfonjGe.exe
2020-02-14 15:46:01,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\yjpHnQyLrU.
2020-02-14 15:46:01,265 [root] DEBUG: Loader: Injecting process 9332 (thread 10068) with C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:46:01,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:46:01,280 [root] DEBUG: Successfully injected DLL C:\qxodz\dll\MGVrkB.dll.
2020-02-14 15:46:01,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9332
2020-02-14 15:46:01,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8648
2020-02-14 15:46:01,296 [lib.api.pro