Analysis

Category Package Started Completed Duration Options Log
FILE Injection 2020-02-14 14:51:01 2020-02-14 15:01:50 649 seconds Show Options Show Log
route = inetsim
procdump = 0
2020-02-14 15:52:37,030 [root] INFO: Date set to: 02-14-20, time set to: 14:52:37, timeout set to: 200
2020-02-14 15:52:37,203 [root] DEBUG: Starting analyzer from: C:\mravd
2020-02-14 15:52:37,217 [root] DEBUG: Storing results at: C:\cbVYOe
2020-02-14 15:52:37,217 [root] DEBUG: Pipe server name: \\.\PIPE\VWqghROB
2020-02-14 15:52:37,217 [root] INFO: Analysis package "Injection" has been specified.
2020-02-14 15:52:59,890 [root] DEBUG: Started auxiliary module Browser
2020-02-14 15:52:59,890 [root] DEBUG: Started auxiliary module Curtain
2020-02-14 15:52:59,890 [modules.auxiliary.digisig] DEBUG: Checking for a digitial signature.
2020-02-14 15:53:08,125 [modules.auxiliary.digisig] DEBUG: File is not signed.
2020-02-14 15:53:08,125 [modules.auxiliary.digisig] INFO: Uploading signature results to aux/DigiSig.json
2020-02-14 15:53:08,125 [root] DEBUG: Started auxiliary module DigiSig
2020-02-14 15:53:08,125 [root] DEBUG: Started auxiliary module Disguise
2020-02-14 15:53:08,125 [root] DEBUG: Started auxiliary module Human
2020-02-14 15:53:08,140 [root] DEBUG: Started auxiliary module Screenshots
2020-02-14 15:53:08,140 [root] DEBUG: Started auxiliary module Sysmon
2020-02-14 15:53:08,140 [root] DEBUG: Started auxiliary module Usage
2020-02-14 15:53:08,140 [root] INFO: Analyzer: Package modules.packages.Injection does not specify a DLL option
2020-02-14 15:53:08,140 [root] INFO: Analyzer: Package modules.packages.Injection does not specify a DLL_64 option
2020-02-14 15:53:13,842 [lib.api.process] INFO: Successfully executed process from path "C:\Users\Rebecca\AppData\Local\Temp\PRODUCT INQUIRY.exe" with arguments "" with pid 2180
2020-02-14 15:53:38,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:38,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:39,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:39,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:39,046 [root] DEBUG: Loader: Injecting process 2180 (thread 2712) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:39,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:39,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:39,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:39,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:39,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2180
2020-02-14 15:53:41,062 [lib.api.process] INFO: Successfully resumed process with pid 2180
2020-02-14 15:53:41,062 [root] INFO: Added new process to list with pid: 2180
2020-02-14 15:53:43,578 [root] DEBUG: Terminate processes on terminate_event disabled.
2020-02-14 15:53:43,578 [root] DEBUG: Capture of injected payloads enabled.
2020-02-14 15:53:43,578 [root] DEBUG: Process dumps disabled.
2020-02-14 15:53:43,703 [root] DEBUG: RestoreHeaders: Restored original import table.
2020-02-14 15:53:43,703 [root] INFO: Disabling sleep skipping.
2020-02-14 15:53:43,703 [root] INFO: Disabling sleep skipping.
2020-02-14 15:53:43,703 [root] INFO: Disabling sleep skipping.
2020-02-14 15:53:43,703 [root] INFO: Disabling sleep skipping.
2020-02-14 15:53:43,703 [root] DEBUG: CAPE initialised: 32-bit monitor loaded in process 2180 at 0x69b00000, image base 0x400000, stack from 0x126000-0x130000
2020-02-14 15:53:43,703 [root] DEBUG: Commandline: C:\Users\Rebecca\AppData\Local\Temp\"C:\Users\Rebecca\AppData\Local\Temp\PRODUCT INQUIRY.exe".
2020-02-14 15:53:43,703 [root] INFO: Monitor successfully loaded in process with pid 2180.
2020-02-14 15:53:44,828 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xb8 amd local view 0x03000000 to global list ().
2020-02-14 15:53:44,953 [root] DEBUG: DLL loaded at 0x74AC0000: C:\Windows\system32\CRYPTBASE (0xc000 bytes).
2020-02-14 15:53:44,967 [root] DEBUG: DLL loaded at 0x74AD0000: C:\Windows\system32\SXS (0x5f000 bytes).
2020-02-14 15:53:45,687 [root] DEBUG: DLL loaded at 0x74060000: C:\Windows\system32\VERSION (0x9000 bytes).
2020-02-14 15:53:45,953 [root] DEBUG: DLL unloaded from 0x00400000.
2020-02-14 15:53:46,030 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xf0 amd local view 0x033D0000 to global list ().
2020-02-14 15:53:46,953 [root] DEBUG: set_caller_info: Adding region at 0x003D0000 to caller regions list (ntdll::LdrGetProcedureAddress).
2020-02-14 15:53:46,967 [root] DEBUG: MapSectionViewHandler: Added section view with handle 0xf4 amd local view 0x76200000 to global list (\KnownDlls\SHELL32.dll).
2020-02-14 15:53:46,967 [root] DEBUG: DLL loaded at 0x76200000: C:\Windows\system32\shell32 (0xc4c000 bytes).
2020-02-14 15:53:47,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2912
2020-02-14 15:53:47,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,233 [root] DEBUG: Loader: Injecting process 2912 (thread 2416) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2912
2020-02-14 15:53:47,250 [root] DEBUG: DLL loaded at 0x74A70000: C:\Windows\system32\apphelp (0x4c000 bytes).
2020-02-14 15:53:47,265 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2912, ImageBase: 0x00400000
2020-02-14 15:53:47,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2912
2020-02-14 15:53:47,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,265 [root] DEBUG: Loader: Injecting process 2912 (thread 2416) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2912
2020-02-14 15:53:47,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3164
2020-02-14 15:53:47,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,280 [root] DEBUG: Loader: Injecting process 3164 (thread 1180) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3164
2020-02-14 15:53:47,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3164, ImageBase: 0x00400000
2020-02-14 15:53:47,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3164
2020-02-14 15:53:47,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,312 [root] DEBUG: Loader: Injecting process 3164 (thread 1180) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3164
2020-02-14 15:53:47,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3200
2020-02-14 15:53:47,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,328 [root] DEBUG: Loader: Injecting process 3200 (thread 3032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3200
2020-02-14 15:53:47,358 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3200, ImageBase: 0x00400000
2020-02-14 15:53:47,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3200
2020-02-14 15:53:47,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,358 [root] DEBUG: Loader: Injecting process 3200 (thread 3032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3200
2020-02-14 15:53:47,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3184
2020-02-14 15:53:47,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,375 [root] DEBUG: Loader: Injecting process 3184 (thread 2716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3184
2020-02-14 15:53:47,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3184, ImageBase: 0x00400000
2020-02-14 15:53:47,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3184
2020-02-14 15:53:47,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,405 [root] DEBUG: Loader: Injecting process 3184 (thread 2716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3184
2020-02-14 15:53:47,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1268
2020-02-14 15:53:47,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,421 [root] DEBUG: Loader: Injecting process 1268 (thread 3236) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1268
2020-02-14 15:53:47,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1268, ImageBase: 0x00400000
2020-02-14 15:53:47,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1268
2020-02-14 15:53:47,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,453 [root] DEBUG: Loader: Injecting process 1268 (thread 3236) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1268
2020-02-14 15:53:47,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2852
2020-02-14 15:53:47,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,546 [root] DEBUG: Loader: Injecting process 2852 (thread 3140) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2852
2020-02-14 15:53:47,562 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2852, ImageBase: 0x00400000
2020-02-14 15:53:47,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2852
2020-02-14 15:53:47,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,562 [root] DEBUG: Loader: Injecting process 2852 (thread 3140) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2852
2020-02-14 15:53:47,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3440
2020-02-14 15:53:47,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,592 [root] DEBUG: Loader: Injecting process 3440 (thread 3328) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3440
2020-02-14 15:53:47,608 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3440, ImageBase: 0x00400000
2020-02-14 15:53:47,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3440
2020-02-14 15:53:47,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,625 [root] DEBUG: Loader: Injecting process 3440 (thread 3328) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3440
2020-02-14 15:53:47,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3604
2020-02-14 15:53:47,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,640 [root] DEBUG: Loader: Injecting process 3604 (thread 3448) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3604
2020-02-14 15:53:47,655 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3604, ImageBase: 0x00400000
2020-02-14 15:53:47,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3604
2020-02-14 15:53:47,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,671 [root] DEBUG: Loader: Injecting process 3604 (thread 3448) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3604
2020-02-14 15:53:47,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3892
2020-02-14 15:53:47,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,687 [root] DEBUG: Loader: Injecting process 3892 (thread 2836) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3892
2020-02-14 15:53:47,703 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3892, ImageBase: 0x00400000
2020-02-14 15:53:47,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3892
2020-02-14 15:53:47,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,717 [root] DEBUG: Loader: Injecting process 3892 (thread 2836) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3892
2020-02-14 15:53:47,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3748
2020-02-14 15:53:47,733 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,733 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,733 [root] DEBUG: Loader: Injecting process 3748 (thread 4068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-02-14 15:53:47,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3748, ImageBase: 0x00400000
2020-02-14 15:53:47,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3748
2020-02-14 15:53:47,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,765 [root] DEBUG: Loader: Injecting process 3748 (thread 4068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3748
2020-02-14 15:53:47,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3780
2020-02-14 15:53:47,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,780 [root] DEBUG: Loader: Injecting process 3780 (thread 3908) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3780
2020-02-14 15:53:47,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3780, ImageBase: 0x00400000
2020-02-14 15:53:47,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3780
2020-02-14 15:53:47,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,812 [root] DEBUG: Loader: Injecting process 3780 (thread 3908) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3780
2020-02-14 15:53:47,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2808
2020-02-14 15:53:47,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,828 [root] DEBUG: Loader: Injecting process 2808 (thread 3940) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2808
2020-02-14 15:53:47,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2808, ImageBase: 0x00400000
2020-02-14 15:53:47,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2808
2020-02-14 15:53:47,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,858 [root] DEBUG: Loader: Injecting process 2808 (thread 3940) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2808
2020-02-14 15:53:47,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1028
2020-02-14 15:53:47,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,875 [root] DEBUG: Loader: Injecting process 1028 (thread 3992) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1028
2020-02-14 15:53:47,890 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1028, ImageBase: 0x00400000
2020-02-14 15:53:47,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1028
2020-02-14 15:53:47,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,905 [root] DEBUG: Loader: Injecting process 1028 (thread 3992) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1028
2020-02-14 15:53:47,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3620
2020-02-14 15:53:47,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,921 [root] DEBUG: Loader: Injecting process 3620 (thread 4076) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3620
2020-02-14 15:53:47,937 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3620, ImageBase: 0x00400000
2020-02-14 15:53:47,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3620
2020-02-14 15:53:47,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,953 [root] DEBUG: Loader: Injecting process 3620 (thread 4076) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:47,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3620
2020-02-14 15:53:47,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3972
2020-02-14 15:53:47,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:47,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:47,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:47,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:47,967 [root] DEBUG: Loader: Injecting process 3972 (thread 648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:47,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:47,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:47,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3972
2020-02-14 15:53:47,983 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3972, ImageBase: 0x00400000
2020-02-14 15:53:47,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3972
2020-02-14 15:53:48,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,000 [root] DEBUG: Loader: Injecting process 3972 (thread 648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3972
2020-02-14 15:53:48,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2636
2020-02-14 15:53:48,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,015 [root] DEBUG: Loader: Injecting process 2636 (thread 2004) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2636
2020-02-14 15:53:48,030 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2636, ImageBase: 0x00400000
2020-02-14 15:53:48,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2636
2020-02-14 15:53:48,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,046 [root] DEBUG: Loader: Injecting process 2636 (thread 2004) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2636
2020-02-14 15:53:48,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1272
2020-02-14 15:53:48,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,062 [root] DEBUG: Loader: Injecting process 1272 (thread 268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1272
2020-02-14 15:53:48,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1272, ImageBase: 0x00400000
2020-02-14 15:53:48,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1272
2020-02-14 15:53:48,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,092 [root] DEBUG: Loader: Injecting process 1272 (thread 268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1272
2020-02-14 15:53:48,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 340
2020-02-14 15:53:48,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,108 [root] DEBUG: Loader: Injecting process 340 (thread 2072) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 340
2020-02-14 15:53:48,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 340, ImageBase: 0x00400000
2020-02-14 15:53:48,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 340
2020-02-14 15:53:48,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,155 [root] DEBUG: Loader: Injecting process 340 (thread 2072) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 340
2020-02-14 15:53:48,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2152
2020-02-14 15:53:48,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,171 [root] DEBUG: Loader: Injecting process 2152 (thread 1896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2152
2020-02-14 15:53:48,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2152, ImageBase: 0x00400000
2020-02-14 15:53:48,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2152
2020-02-14 15:53:48,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,203 [root] DEBUG: Loader: Injecting process 2152 (thread 1896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2152
2020-02-14 15:53:48,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1888
2020-02-14 15:53:48,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,250 [root] DEBUG: Loader: Injecting process 1888 (thread 1848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1888
2020-02-14 15:53:48,265 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1888, ImageBase: 0x00400000
2020-02-14 15:53:48,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1888
2020-02-14 15:53:48,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,280 [root] DEBUG: Loader: Injecting process 1888 (thread 1848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1888
2020-02-14 15:53:48,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2192
2020-02-14 15:53:48,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,296 [root] DEBUG: Loader: Injecting process 2192 (thread 2848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2192
2020-02-14 15:53:48,312 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2192, ImageBase: 0x00400000
2020-02-14 15:53:48,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2192
2020-02-14 15:53:48,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,328 [root] DEBUG: Loader: Injecting process 2192 (thread 2848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2192
2020-02-14 15:53:48,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3576
2020-02-14 15:53:48,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,342 [root] DEBUG: Loader: Injecting process 3576 (thread 3120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-02-14 15:53:48,358 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3576, ImageBase: 0x00400000
2020-02-14 15:53:48,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3576
2020-02-14 15:53:48,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,375 [root] DEBUG: Loader: Injecting process 3576 (thread 3120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3576
2020-02-14 15:53:48,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2740
2020-02-14 15:53:48,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,390 [root] DEBUG: Loader: Injecting process 2740 (thread 996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2740
2020-02-14 15:53:48,405 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2740, ImageBase: 0x00400000
2020-02-14 15:53:48,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2740
2020-02-14 15:53:48,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,421 [root] DEBUG: Loader: Injecting process 2740 (thread 996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2740
2020-02-14 15:53:48,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3324
2020-02-14 15:53:48,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,437 [root] DEBUG: Loader: Injecting process 3324 (thread 3352) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3324
2020-02-14 15:53:48,453 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3324, ImageBase: 0x00400000
2020-02-14 15:53:48,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3324
2020-02-14 15:53:48,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,467 [root] DEBUG: Loader: Injecting process 3324 (thread 3352) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3324
2020-02-14 15:53:48,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3340
2020-02-14 15:53:48,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,483 [root] DEBUG: Loader: Injecting process 3340 (thread 3004) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3340
2020-02-14 15:53:48,500 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3340, ImageBase: 0x00400000
2020-02-14 15:53:48,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3340
2020-02-14 15:53:48,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,515 [root] DEBUG: Loader: Injecting process 3340 (thread 3004) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3340
2020-02-14 15:53:48,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3296
2020-02-14 15:53:48,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,717 [root] DEBUG: Loader: Injecting process 3296 (thread 3372) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3296
2020-02-14 15:53:48,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3296, ImageBase: 0x00400000
2020-02-14 15:53:48,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3296
2020-02-14 15:53:48,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,750 [root] DEBUG: Loader: Injecting process 3296 (thread 3372) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3296
2020-02-14 15:53:48,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3460
2020-02-14 15:53:48,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,828 [root] DEBUG: Loader: Injecting process 3460 (thread 2844) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3460
2020-02-14 15:53:48,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3460, ImageBase: 0x00400000
2020-02-14 15:53:48,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3460
2020-02-14 15:53:48,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,858 [root] DEBUG: Loader: Injecting process 3460 (thread 2844) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3460
2020-02-14 15:53:48,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3692
2020-02-14 15:53:48,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,875 [root] DEBUG: Loader: Injecting process 3692 (thread 3548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:48,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3692
2020-02-14 15:53:48,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3692, ImageBase: 0x00400000
2020-02-14 15:53:48,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3692
2020-02-14 15:53:48,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:48,921 [root] DEBUG: Loader: Injecting process 3692 (thread 3548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:48,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:48,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:48,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3692
2020-02-14 15:53:48,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3740
2020-02-14 15:53:48,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:48,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:48,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:48,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,000 [root] DEBUG: Loader: Injecting process 3740 (thread 3796) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3740
2020-02-14 15:53:49,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3740, ImageBase: 0x00400000
2020-02-14 15:53:49,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3740
2020-02-14 15:53:49,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,015 [root] DEBUG: Loader: Injecting process 3740 (thread 3796) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3740
2020-02-14 15:53:49,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3728
2020-02-14 15:53:49,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,030 [root] DEBUG: Loader: Injecting process 3728 (thread 3656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3728
2020-02-14 15:53:49,062 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3728, ImageBase: 0x00400000
2020-02-14 15:53:49,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3728
2020-02-14 15:53:49,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,062 [root] DEBUG: Loader: Injecting process 3728 (thread 3656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3728
2020-02-14 15:53:49,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3912
2020-02-14 15:53:49,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,108 [root] DEBUG: Loader: Injecting process 3912 (thread 2760) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3912
2020-02-14 15:53:49,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3912, ImageBase: 0x00400000
2020-02-14 15:53:49,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3912
2020-02-14 15:53:49,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,140 [root] DEBUG: Loader: Injecting process 3912 (thread 2760) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3912
2020-02-14 15:53:49,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4056
2020-02-14 15:53:49,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,171 [root] DEBUG: Loader: Injecting process 4056 (thread 2160) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4056
2020-02-14 15:53:49,187 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4056, ImageBase: 0x00400000
2020-02-14 15:53:49,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4056
2020-02-14 15:53:49,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,233 [root] DEBUG: Loader: Injecting process 4056 (thread 2160) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4056
2020-02-14 15:53:49,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4048
2020-02-14 15:53:49,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,265 [root] DEBUG: Loader: Injecting process 4048 (thread 4024) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4048
2020-02-14 15:53:49,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4048, ImageBase: 0x00400000
2020-02-14 15:53:49,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4048
2020-02-14 15:53:49,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,296 [root] DEBUG: Loader: Injecting process 4048 (thread 4024) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4048
2020-02-14 15:53:49,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1172
2020-02-14 15:53:49,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,312 [root] DEBUG: Loader: Injecting process 1172 (thread 2088) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1172
2020-02-14 15:53:49,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1172, ImageBase: 0x00400000
2020-02-14 15:53:49,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1172
2020-02-14 15:53:49,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,342 [root] DEBUG: Loader: Injecting process 1172 (thread 2088) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1172
2020-02-14 15:53:49,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2136
2020-02-14 15:53:49,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,358 [root] DEBUG: Loader: Injecting process 2136 (thread 2436) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2136
2020-02-14 15:53:49,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2136, ImageBase: 0x00400000
2020-02-14 15:53:49,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2136
2020-02-14 15:53:49,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,390 [root] DEBUG: Loader: Injecting process 2136 (thread 2436) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2136
2020-02-14 15:53:49,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1324
2020-02-14 15:53:49,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,405 [root] DEBUG: Loader: Injecting process 1324 (thread 3212) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1324
2020-02-14 15:53:49,421 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1324, ImageBase: 0x00400000
2020-02-14 15:53:49,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1324
2020-02-14 15:53:49,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,437 [root] DEBUG: Loader: Injecting process 1324 (thread 3212) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1324
2020-02-14 15:53:49,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 920
2020-02-14 15:53:49,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,453 [root] DEBUG: Loader: Injecting process 920 (thread 700) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 920
2020-02-14 15:53:49,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 920, ImageBase: 0x00400000
2020-02-14 15:53:49,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 920
2020-02-14 15:53:49,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,483 [root] DEBUG: Loader: Injecting process 920 (thread 700) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:49,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 920
2020-02-14 15:53:49,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 244
2020-02-14 15:53:49,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:49,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:49,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:49,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:49,500 [root] DEBUG: Loader: Injecting process 244 (thread 1632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:49,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:49,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:49,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 244
2020-02-14 15:53:49,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 244, ImageBase: 0x00400000
2020-02-14 15:53:49,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 244
2020-02-14 15:53:50,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,078 [root] DEBUG: Loader: Injecting process 244 (thread 1632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 244
2020-02-14 15:53:50,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 284
2020-02-14 15:53:50,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,092 [root] DEBUG: Loader: Injecting process 284 (thread 2956) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 284
2020-02-14 15:53:50,108 [root] DEBUG: CreateProcessHandler: Injection info set for new process 284, ImageBase: 0x00400000
2020-02-14 15:53:50,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 284
2020-02-14 15:53:50,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,108 [root] DEBUG: Loader: Injecting process 284 (thread 2956) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 284
2020-02-14 15:53:50,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2944
2020-02-14 15:53:50,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,140 [root] DEBUG: Loader: Injecting process 2944 (thread 992) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2944
2020-02-14 15:53:50,155 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2944, ImageBase: 0x00400000
2020-02-14 15:53:50,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2944
2020-02-14 15:53:50,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,171 [root] DEBUG: Loader: Injecting process 2944 (thread 992) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2944
2020-02-14 15:53:50,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2896
2020-02-14 15:53:50,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,187 [root] DEBUG: Loader: Injecting process 2896 (thread 3888) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2896
2020-02-14 15:53:50,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2896, ImageBase: 0x00400000
2020-02-14 15:53:50,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2896
2020-02-14 15:53:50,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,217 [root] DEBUG: Loader: Injecting process 2896 (thread 3888) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2896
2020-02-14 15:53:50,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3420
2020-02-14 15:53:50,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,280 [root] DEBUG: Loader: Injecting process 3420 (thread 2996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3420
2020-02-14 15:53:50,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3420, ImageBase: 0x00400000
2020-02-14 15:53:50,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3420
2020-02-14 15:53:50,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,312 [root] DEBUG: Loader: Injecting process 3420 (thread 2996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3420
2020-02-14 15:53:50,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3536
2020-02-14 15:53:50,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,328 [root] DEBUG: Loader: Injecting process 3536 (thread 3412) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3536
2020-02-14 15:53:50,342 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3536, ImageBase: 0x00400000
2020-02-14 15:53:50,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3536
2020-02-14 15:53:50,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,342 [root] DEBUG: Loader: Injecting process 3536 (thread 3412) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3536
2020-02-14 15:53:50,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3384
2020-02-14 15:53:50,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,375 [root] DEBUG: Loader: Injecting process 3384 (thread 3632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3384
2020-02-14 15:53:50,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3384, ImageBase: 0x00400000
2020-02-14 15:53:50,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3384
2020-02-14 15:53:50,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,405 [root] DEBUG: Loader: Injecting process 3384 (thread 3632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3384
2020-02-14 15:53:50,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3396
2020-02-14 15:53:50,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,421 [root] DEBUG: Loader: Injecting process 3396 (thread 3716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3396
2020-02-14 15:53:50,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3396, ImageBase: 0x00400000
2020-02-14 15:53:50,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3396
2020-02-14 15:53:50,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,453 [root] DEBUG: Loader: Injecting process 3396 (thread 3716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3396
2020-02-14 15:53:50,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3696
2020-02-14 15:53:50,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,467 [root] DEBUG: Loader: Injecting process 3696 (thread 2204) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3696
2020-02-14 15:53:50,483 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3696, ImageBase: 0x00400000
2020-02-14 15:53:50,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3696
2020-02-14 15:53:50,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,500 [root] DEBUG: Loader: Injecting process 3696 (thread 2204) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3696
2020-02-14 15:53:50,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3988
2020-02-14 15:53:50,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,515 [root] DEBUG: Loader: Injecting process 3988 (thread 3840) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-02-14 15:53:50,530 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3988, ImageBase: 0x00400000
2020-02-14 15:53:50,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3988
2020-02-14 15:53:50,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,546 [root] DEBUG: Loader: Injecting process 3988 (thread 3840) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3988
2020-02-14 15:53:50,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4060
2020-02-14 15:53:50,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,562 [root] DEBUG: Loader: Injecting process 4060 (thread 3932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4060
2020-02-14 15:53:50,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4060, ImageBase: 0x00400000
2020-02-14 15:53:50,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4060
2020-02-14 15:53:50,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,592 [root] DEBUG: Loader: Injecting process 4060 (thread 3932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4060
2020-02-14 15:53:50,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2804
2020-02-14 15:53:50,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,890 [root] DEBUG: Loader: Injecting process 2804 (thread 1868) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2804
2020-02-14 15:53:50,905 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2804, ImageBase: 0x00400000
2020-02-14 15:53:50,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2804
2020-02-14 15:53:50,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,905 [root] DEBUG: Loader: Injecting process 2804 (thread 1868) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2804
2020-02-14 15:53:50,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2224
2020-02-14 15:53:50,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,921 [root] DEBUG: Loader: Injecting process 2224 (thread 2068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2224
2020-02-14 15:53:50,937 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2224, ImageBase: 0x00400000
2020-02-14 15:53:50,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2224
2020-02-14 15:53:50,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,937 [root] DEBUG: Loader: Injecting process 2224 (thread 2068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:50,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2224
2020-02-14 15:53:50,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3624
2020-02-14 15:53:50,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:50,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:50,967 [root] DEBUG: Loader: Injecting process 3624 (thread 2232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:50,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:50,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:50,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3624
2020-02-14 15:53:50,983 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3624, ImageBase: 0x00400000
2020-02-14 15:53:50,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3624
2020-02-14 15:53:50,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:50,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:50,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,000 [root] DEBUG: Loader: Injecting process 3624 (thread 2232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3624
2020-02-14 15:53:51,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1876
2020-02-14 15:53:51,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,015 [root] DEBUG: Loader: Injecting process 1876 (thread 716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1876
2020-02-14 15:53:51,030 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1876, ImageBase: 0x00400000
2020-02-14 15:53:51,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1876
2020-02-14 15:53:51,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,030 [root] DEBUG: Loader: Injecting process 1876 (thread 716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1876
2020-02-14 15:53:51,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2076
2020-02-14 15:53:51,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,062 [root] DEBUG: Loader: Injecting process 2076 (thread 1648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2076
2020-02-14 15:53:51,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2076, ImageBase: 0x00400000
2020-02-14 15:53:51,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2076
2020-02-14 15:53:51,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,092 [root] DEBUG: Loader: Injecting process 2076 (thread 1648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2076
2020-02-14 15:53:51,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2960
2020-02-14 15:53:51,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,140 [root] DEBUG: Loader: Injecting process 2960 (thread 1928) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2960
2020-02-14 15:53:51,155 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2960, ImageBase: 0x00400000
2020-02-14 15:53:51,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2960
2020-02-14 15:53:51,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,155 [root] DEBUG: Loader: Injecting process 2960 (thread 1928) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2960
2020-02-14 15:53:51,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2588
2020-02-14 15:53:51,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,187 [root] DEBUG: Loader: Injecting process 2588 (thread 2828) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-02-14 15:53:51,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2588, ImageBase: 0x00400000
2020-02-14 15:53:51,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2588
2020-02-14 15:53:51,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,217 [root] DEBUG: Loader: Injecting process 2588 (thread 2828) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2588
2020-02-14 15:53:51,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3984
2020-02-14 15:53:51,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,233 [root] DEBUG: Loader: Injecting process 3984 (thread 3244) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3984
2020-02-14 15:53:51,250 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3984, ImageBase: 0x00400000
2020-02-14 15:53:51,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3984
2020-02-14 15:53:51,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,265 [root] DEBUG: Loader: Injecting process 3984 (thread 3244) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3984
2020-02-14 15:53:51,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1524
2020-02-14 15:53:51,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,296 [root] DEBUG: Loader: Injecting process 1524 (thread 1308) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1524
2020-02-14 15:53:51,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1524, ImageBase: 0x00400000
2020-02-14 15:53:51,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1524
2020-02-14 15:53:51,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,328 [root] DEBUG: Loader: Injecting process 1524 (thread 1308) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1524
2020-02-14 15:53:51,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3376
2020-02-14 15:53:51,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,358 [root] DEBUG: Loader: Injecting process 3376 (thread 3464) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3376
2020-02-14 15:53:51,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3376, ImageBase: 0x00400000
2020-02-14 15:53:51,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3376
2020-02-14 15:53:51,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,375 [root] DEBUG: Loader: Injecting process 3376 (thread 3464) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3376
2020-02-14 15:53:51,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3344
2020-02-14 15:53:51,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,405 [root] DEBUG: Loader: Injecting process 3344 (thread 3388) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3344
2020-02-14 15:53:51,421 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3344, ImageBase: 0x00400000
2020-02-14 15:53:51,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3344
2020-02-14 15:53:51,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,437 [root] DEBUG: Loader: Injecting process 3344 (thread 3388) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3344
2020-02-14 15:53:51,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3776
2020-02-14 15:53:51,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,453 [root] DEBUG: Loader: Injecting process 3776 (thread 3416) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3776
2020-02-14 15:53:51,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3776, ImageBase: 0x00400000
2020-02-14 15:53:51,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3776
2020-02-14 15:53:51,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,483 [root] DEBUG: Loader: Injecting process 3776 (thread 3416) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3776
2020-02-14 15:53:51,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4012
2020-02-14 15:53:51,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,500 [root] DEBUG: Loader: Injecting process 4012 (thread 3680) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4012
2020-02-14 15:53:51,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4012, ImageBase: 0x00400000
2020-02-14 15:53:51,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4012
2020-02-14 15:53:51,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,530 [root] DEBUG: Loader: Injecting process 4012 (thread 3680) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4012
2020-02-14 15:53:51,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2124
2020-02-14 15:53:51,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,546 [root] DEBUG: Loader: Injecting process 2124 (thread 4028) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2124
2020-02-14 15:53:51,562 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2124, ImageBase: 0x00400000
2020-02-14 15:53:51,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2124
2020-02-14 15:53:51,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,578 [root] DEBUG: Loader: Injecting process 2124 (thread 4028) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2124
2020-02-14 15:53:51,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3744
2020-02-14 15:53:51,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,592 [root] DEBUG: Loader: Injecting process 3744 (thread 2692) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3744
2020-02-14 15:53:51,608 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3744, ImageBase: 0x00400000
2020-02-14 15:53:51,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3744
2020-02-14 15:53:51,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,625 [root] DEBUG: Loader: Injecting process 3744 (thread 2692) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3744
2020-02-14 15:53:51,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4084
2020-02-14 15:53:51,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,640 [root] DEBUG: Loader: Injecting process 4084 (thread 2120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4084
2020-02-14 15:53:51,655 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4084, ImageBase: 0x00400000
2020-02-14 15:53:51,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4084
2020-02-14 15:53:51,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,671 [root] DEBUG: Loader: Injecting process 4084 (thread 2120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4084
2020-02-14 15:53:51,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1252
2020-02-14 15:53:51,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,687 [root] DEBUG: Loader: Injecting process 1252 (thread 2624) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1252
2020-02-14 15:53:51,703 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1252, ImageBase: 0x00400000
2020-02-14 15:53:51,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1252
2020-02-14 15:53:51,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,717 [root] DEBUG: Loader: Injecting process 1252 (thread 2624) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1252
2020-02-14 15:53:51,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2368
2020-02-14 15:53:51,733 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,733 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,733 [root] DEBUG: Loader: Injecting process 2368 (thread 1608) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2368
2020-02-14 15:53:51,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2368, ImageBase: 0x00400000
2020-02-14 15:53:51,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2368
2020-02-14 15:53:51,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,765 [root] DEBUG: Loader: Injecting process 2368 (thread 1608) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2368
2020-02-14 15:53:51,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3172
2020-02-14 15:53:51,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,780 [root] DEBUG: Loader: Injecting process 3172 (thread 1328) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3172
2020-02-14 15:53:51,796 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3172, ImageBase: 0x00400000
2020-02-14 15:53:51,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3172
2020-02-14 15:53:51,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,812 [root] DEBUG: Loader: Injecting process 3172 (thread 1328) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3172
2020-02-14 15:53:51,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2976
2020-02-14 15:53:51,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,842 [root] DEBUG: Loader: Injecting process 2976 (thread 896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2976
2020-02-14 15:53:51,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2976, ImageBase: 0x00400000
2020-02-14 15:53:51,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2976
2020-02-14 15:53:51,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,890 [root] DEBUG: Loader: Injecting process 2976 (thread 896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2976
2020-02-14 15:53:51,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3112
2020-02-14 15:53:51,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,905 [root] DEBUG: Loader: Injecting process 3112 (thread 2924) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3112
2020-02-14 15:53:51,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3112, ImageBase: 0x00400000
2020-02-14 15:53:51,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3112
2020-02-14 15:53:51,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,937 [root] DEBUG: Loader: Injecting process 3112 (thread 2924) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3112
2020-02-14 15:53:51,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3400
2020-02-14 15:53:51,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,953 [root] DEBUG: Loader: Injecting process 3400 (thread 3432) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:51,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3400
2020-02-14 15:53:51,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3400, ImageBase: 0x00400000
2020-02-14 15:53:51,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3400
2020-02-14 15:53:51,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:51,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:51,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:51,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:51,983 [root] DEBUG: Loader: Injecting process 3400 (thread 3432) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:51,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:51,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:51,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3400
2020-02-14 15:53:52,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3708
2020-02-14 15:53:52,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,000 [root] DEBUG: Loader: Injecting process 3708 (thread 3552) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3708
2020-02-14 15:53:52,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3708, ImageBase: 0x00400000
2020-02-14 15:53:52,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3708
2020-02-14 15:53:52,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,030 [root] DEBUG: Loader: Injecting process 3708 (thread 3552) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3708
2020-02-14 15:53:52,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 256
2020-02-14 15:53:52,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,046 [root] DEBUG: Loader: Injecting process 256 (thread 3724) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 256
2020-02-14 15:53:52,062 [root] DEBUG: CreateProcessHandler: Injection info set for new process 256, ImageBase: 0x00400000
2020-02-14 15:53:52,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 256
2020-02-14 15:53:52,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,078 [root] DEBUG: Loader: Injecting process 256 (thread 3724) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 256
2020-02-14 15:53:52,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2148
2020-02-14 15:53:52,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,092 [root] DEBUG: Loader: Injecting process 2148 (thread 3856) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2148
2020-02-14 15:53:52,108 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2148, ImageBase: 0x00400000
2020-02-14 15:53:52,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2148
2020-02-14 15:53:52,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,125 [root] DEBUG: Loader: Injecting process 2148 (thread 3856) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2148
2020-02-14 15:53:52,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2644
2020-02-14 15:53:52,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,140 [root] DEBUG: Loader: Injecting process 2644 (thread 316) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2644
2020-02-14 15:53:52,155 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2644, ImageBase: 0x00400000
2020-02-14 15:53:52,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2644
2020-02-14 15:53:52,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,171 [root] DEBUG: Loader: Injecting process 2644 (thread 316) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2644
2020-02-14 15:53:52,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4004
2020-02-14 15:53:52,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,187 [root] DEBUG: Loader: Injecting process 4004 (thread 1540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-02-14 15:53:52,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4004, ImageBase: 0x00400000
2020-02-14 15:53:52,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4004
2020-02-14 15:53:52,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,250 [root] DEBUG: Loader: Injecting process 4004 (thread 1540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4004
2020-02-14 15:53:52,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 876
2020-02-14 15:53:52,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,280 [root] DEBUG: Loader: Injecting process 876 (thread 1228) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 876
2020-02-14 15:53:52,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 876, ImageBase: 0x00400000
2020-02-14 15:53:52,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 876
2020-02-14 15:53:52,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,312 [root] DEBUG: Loader: Injecting process 876 (thread 1228) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 876
2020-02-14 15:53:52,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2792
2020-02-14 15:53:52,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,328 [root] DEBUG: Loader: Injecting process 2792 (thread 976) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2792
2020-02-14 15:53:52,342 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2792, ImageBase: 0x00400000
2020-02-14 15:53:52,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2792
2020-02-14 15:53:52,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,358 [root] DEBUG: Loader: Injecting process 2792 (thread 976) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2792
2020-02-14 15:53:52,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2720
2020-02-14 15:53:52,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,375 [root] DEBUG: Loader: Injecting process 2720 (thread 3128) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2720
2020-02-14 15:53:52,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2720, ImageBase: 0x00400000
2020-02-14 15:53:52,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2720
2020-02-14 15:53:52,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,405 [root] DEBUG: Loader: Injecting process 2720 (thread 3128) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2720
2020-02-14 15:53:52,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3100
2020-02-14 15:53:52,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,421 [root] DEBUG: Loader: Injecting process 3100 (thread 1988) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3100
2020-02-14 15:53:52,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3100, ImageBase: 0x00400000
2020-02-14 15:53:52,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3100
2020-02-14 15:53:52,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,453 [root] DEBUG: Loader: Injecting process 3100 (thread 1988) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3100
2020-02-14 15:53:52,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3612
2020-02-14 15:53:52,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,467 [root] DEBUG: Loader: Injecting process 3612 (thread 3524) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3612
2020-02-14 15:53:52,483 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3612, ImageBase: 0x00400000
2020-02-14 15:53:52,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3612
2020-02-14 15:53:52,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,500 [root] DEBUG: Loader: Injecting process 3612 (thread 3524) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3612
2020-02-14 15:53:52,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3648
2020-02-14 15:53:52,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,515 [root] DEBUG: Loader: Injecting process 3648 (thread 3876) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3648
2020-02-14 15:53:52,530 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3648, ImageBase: 0x00400000
2020-02-14 15:53:52,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3648
2020-02-14 15:53:52,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,546 [root] DEBUG: Loader: Injecting process 3648 (thread 3876) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3648
2020-02-14 15:53:52,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3784
2020-02-14 15:53:52,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,562 [root] DEBUG: Loader: Injecting process 3784 (thread 3936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3784
2020-02-14 15:53:52,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3784, ImageBase: 0x00400000
2020-02-14 15:53:52,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3784
2020-02-14 15:53:52,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,592 [root] DEBUG: Loader: Injecting process 3784 (thread 3936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3784
2020-02-14 15:53:52,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1356
2020-02-14 15:53:52,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,608 [root] DEBUG: Loader: Injecting process 1356 (thread 3196) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1356
2020-02-14 15:53:52,625 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1356, ImageBase: 0x00400000
2020-02-14 15:53:52,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1356
2020-02-14 15:53:52,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,640 [root] DEBUG: Loader: Injecting process 1356 (thread 3196) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1356
2020-02-14 15:53:52,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1824
2020-02-14 15:53:52,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,655 [root] DEBUG: Loader: Injecting process 1824 (thread 3836) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1824
2020-02-14 15:53:52,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1824, ImageBase: 0x00400000
2020-02-14 15:53:52,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1824
2020-02-14 15:53:52,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,687 [root] DEBUG: Loader: Injecting process 1824 (thread 3836) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1824
2020-02-14 15:53:52,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1128
2020-02-14 15:53:52,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,703 [root] DEBUG: Loader: Injecting process 1128 (thread 2800) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1128
2020-02-14 15:53:52,717 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1128, ImageBase: 0x00400000
2020-02-14 15:53:52,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1128
2020-02-14 15:53:52,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,733 [root] DEBUG: Loader: Injecting process 1128 (thread 2800) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1128
2020-02-14 15:53:52,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1336
2020-02-14 15:53:52,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,750 [root] DEBUG: Loader: Injecting process 1336 (thread 1008) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1336
2020-02-14 15:53:52,765 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1336, ImageBase: 0x00400000
2020-02-14 15:53:52,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1336
2020-02-14 15:53:52,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,780 [root] DEBUG: Loader: Injecting process 1336 (thread 1008) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1336
2020-02-14 15:53:52,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3240
2020-02-14 15:53:52,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,796 [root] DEBUG: Loader: Injecting process 3240 (thread 2968) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3240
2020-02-14 15:53:52,828 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3240, ImageBase: 0x00400000
2020-02-14 15:53:52,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3240
2020-02-14 15:53:52,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,828 [root] DEBUG: Loader: Injecting process 3240 (thread 2968) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3240
2020-02-14 15:53:52,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3148
2020-02-14 15:53:52,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,842 [root] DEBUG: Loader: Injecting process 3148 (thread 580) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3148
2020-02-14 15:53:52,858 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3148, ImageBase: 0x00400000
2020-02-14 15:53:52,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3148
2020-02-14 15:53:52,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,875 [root] DEBUG: Loader: Injecting process 3148 (thread 580) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3148
2020-02-14 15:53:52,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3544
2020-02-14 15:53:52,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,890 [root] DEBUG: Loader: Injecting process 3544 (thread 3424) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3544
2020-02-14 15:53:52,905 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3544, ImageBase: 0x00400000
2020-02-14 15:53:52,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3544
2020-02-14 15:53:52,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,921 [root] DEBUG: Loader: Injecting process 3544 (thread 3424) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3544
2020-02-14 15:53:52,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3844
2020-02-14 15:53:52,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,937 [root] DEBUG: Loader: Injecting process 3844 (thread 2748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3844
2020-02-14 15:53:52,953 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3844, ImageBase: 0x00400000
2020-02-14 15:53:52,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3844
2020-02-14 15:53:52,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,967 [root] DEBUG: Loader: Injecting process 3844 (thread 2748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:52,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3844
2020-02-14 15:53:52,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1196
2020-02-14 15:53:52,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:52,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:52,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:52,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:52,983 [root] DEBUG: Loader: Injecting process 1196 (thread 3980) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:52,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:52,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:52,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1196
2020-02-14 15:53:53,000 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1196, ImageBase: 0x00400000
2020-02-14 15:53:53,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1196
2020-02-14 15:53:53,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,015 [root] DEBUG: Loader: Injecting process 1196 (thread 3980) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1196
2020-02-14 15:53:53,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3520
2020-02-14 15:53:53,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,030 [root] DEBUG: Loader: Injecting process 3520 (thread 1604) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3520
2020-02-14 15:53:53,046 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3520, ImageBase: 0x00400000
2020-02-14 15:53:53,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3520
2020-02-14 15:53:53,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,062 [root] DEBUG: Loader: Injecting process 3520 (thread 1604) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3520
2020-02-14 15:53:53,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1424
2020-02-14 15:53:53,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,078 [root] DEBUG: Loader: Injecting process 1424 (thread 1968) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1424
2020-02-14 15:53:53,092 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1424, ImageBase: 0x00400000
2020-02-14 15:53:53,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1424
2020-02-14 15:53:53,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,108 [root] DEBUG: Loader: Injecting process 1424 (thread 1968) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1424
2020-02-14 15:53:53,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2648
2020-02-14 15:53:53,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,125 [root] DEBUG: Loader: Injecting process 2648 (thread 3096) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2648
2020-02-14 15:53:53,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2648, ImageBase: 0x00400000
2020-02-14 15:53:53,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2648
2020-02-14 15:53:53,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,155 [root] DEBUG: Loader: Injecting process 2648 (thread 3096) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2648
2020-02-14 15:53:53,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3064
2020-02-14 15:53:53,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,171 [root] DEBUG: Loader: Injecting process 3064 (thread 1144) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3064
2020-02-14 15:53:53,187 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3064, ImageBase: 0x00400000
2020-02-14 15:53:53,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3064
2020-02-14 15:53:53,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,203 [root] DEBUG: Loader: Injecting process 3064 (thread 1144) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,203 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3064
2020-02-14 15:53:53,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3204
2020-02-14 15:53:53,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,217 [root] DEBUG: Loader: Injecting process 3204 (thread 3568) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3204
2020-02-14 15:53:53,233 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3204, ImageBase: 0x00400000
2020-02-14 15:53:53,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3204
2020-02-14 15:53:53,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,250 [root] DEBUG: Loader: Injecting process 3204 (thread 3568) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3204
2020-02-14 15:53:53,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3964
2020-02-14 15:53:53,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,265 [root] DEBUG: Loader: Injecting process 3964 (thread 4064) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3964
2020-02-14 15:53:53,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3964, ImageBase: 0x00400000
2020-02-14 15:53:53,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3964
2020-02-14 15:53:53,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,312 [root] DEBUG: Loader: Injecting process 3964 (thread 4064) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3964
2020-02-14 15:53:53,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2496
2020-02-14 15:53:53,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,483 [root] DEBUG: Loader: Injecting process 2496 (thread 2864) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2496
2020-02-14 15:53:53,500 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2496, ImageBase: 0x00400000
2020-02-14 15:53:53,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2496
2020-02-14 15:53:53,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,515 [root] DEBUG: Loader: Injecting process 2496 (thread 2864) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2496
2020-02-14 15:53:53,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1932
2020-02-14 15:53:53,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,530 [root] DEBUG: Loader: Injecting process 1932 (thread 2928) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1932
2020-02-14 15:53:53,562 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1932, ImageBase: 0x00400000
2020-02-14 15:53:53,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1932
2020-02-14 15:53:53,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,562 [root] DEBUG: Loader: Injecting process 1932 (thread 2928) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1932
2020-02-14 15:53:53,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 532
2020-02-14 15:53:53,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,592 [root] DEBUG: Loader: Injecting process 532 (thread 2080) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 532
2020-02-14 15:53:53,625 [root] DEBUG: CreateProcessHandler: Injection info set for new process 532, ImageBase: 0x00400000
2020-02-14 15:53:53,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 532
2020-02-14 15:53:53,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,625 [root] DEBUG: Loader: Injecting process 532 (thread 2080) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 532
2020-02-14 15:53:53,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1280
2020-02-14 15:53:53,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,640 [root] DEBUG: Loader: Injecting process 1280 (thread 2812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1280
2020-02-14 15:53:53,655 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1280, ImageBase: 0x00400000
2020-02-14 15:53:53,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1280
2020-02-14 15:53:53,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,671 [root] DEBUG: Loader: Injecting process 1280 (thread 2812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1280
2020-02-14 15:53:53,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3864
2020-02-14 15:53:53,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,687 [root] DEBUG: Loader: Injecting process 3864 (thread 3664) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3864
2020-02-14 15:53:53,703 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3864, ImageBase: 0x00400000
2020-02-14 15:53:53,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3864
2020-02-14 15:53:53,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,717 [root] DEBUG: Loader: Injecting process 3864 (thread 3664) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3864
2020-02-14 15:53:53,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3952
2020-02-14 15:53:53,733 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,733 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,733 [root] DEBUG: Loader: Injecting process 3952 (thread 3592) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3952
2020-02-14 15:53:53,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3952, ImageBase: 0x00400000
2020-02-14 15:53:53,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3952
2020-02-14 15:53:53,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,765 [root] DEBUG: Loader: Injecting process 3952 (thread 3592) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3952
2020-02-14 15:53:53,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 704
2020-02-14 15:53:53,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,780 [root] DEBUG: Loader: Injecting process 704 (thread 2156) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 704
2020-02-14 15:53:53,796 [root] DEBUG: CreateProcessHandler: Injection info set for new process 704, ImageBase: 0x00400000
2020-02-14 15:53:53,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 704
2020-02-14 15:53:53,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,812 [root] DEBUG: Loader: Injecting process 704 (thread 2156) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 704
2020-02-14 15:53:53,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1464
2020-02-14 15:53:53,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,828 [root] DEBUG: Loader: Injecting process 1464 (thread 2704) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1464
2020-02-14 15:53:53,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1464, ImageBase: 0x00400000
2020-02-14 15:53:53,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1464
2020-02-14 15:53:53,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,858 [root] DEBUG: Loader: Injecting process 1464 (thread 2704) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1464
2020-02-14 15:53:53,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2988
2020-02-14 15:53:53,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,875 [root] DEBUG: Loader: Injecting process 2988 (thread 1420) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2988
2020-02-14 15:53:53,890 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2988, ImageBase: 0x00400000
2020-02-14 15:53:53,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2988
2020-02-14 15:53:53,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,905 [root] DEBUG: Loader: Injecting process 2988 (thread 1420) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:53,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2988
2020-02-14 15:53:53,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3580
2020-02-14 15:53:53,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:53,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:53,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:53,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:53,921 [root] DEBUG: Loader: Injecting process 3580 (thread 3492) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:53,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:53,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:53,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3580
2020-02-14 15:53:53,953 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3580, ImageBase: 0x00400000
2020-02-14 15:53:53,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3580
2020-02-14 15:53:54,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,405 [root] DEBUG: Loader: Injecting process 3580 (thread 3492) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3580
2020-02-14 15:53:54,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1148
2020-02-14 15:53:54,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,421 [root] DEBUG: Loader: Injecting process 1148 (thread 3896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1148
2020-02-14 15:53:54,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1148, ImageBase: 0x00400000
2020-02-14 15:53:54,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1148
2020-02-14 15:53:54,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,453 [root] DEBUG: Loader: Injecting process 1148 (thread 3896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1148
2020-02-14 15:53:54,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3468
2020-02-14 15:53:54,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,483 [root] DEBUG: Loader: Injecting process 3468 (thread 2444) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3468
2020-02-14 15:53:54,500 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3468, ImageBase: 0x00400000
2020-02-14 15:53:54,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3468
2020-02-14 15:53:54,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,515 [root] DEBUG: Loader: Injecting process 3468 (thread 2444) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3468
2020-02-14 15:53:54,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3016
2020-02-14 15:53:54,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,530 [root] DEBUG: Loader: Injecting process 3016 (thread 2736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3016
2020-02-14 15:53:54,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3016, ImageBase: 0x00400000
2020-02-14 15:53:54,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3016
2020-02-14 15:53:54,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,562 [root] DEBUG: Loader: Injecting process 3016 (thread 2736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3016
2020-02-14 15:53:54,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2696
2020-02-14 15:53:54,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,578 [root] DEBUG: Loader: Injecting process 2696 (thread 3268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2696
2020-02-14 15:53:54,592 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2696, ImageBase: 0x00400000
2020-02-14 15:53:54,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2696
2020-02-14 15:53:54,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,608 [root] DEBUG: Loader: Injecting process 2696 (thread 3268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2696
2020-02-14 15:53:54,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2916
2020-02-14 15:53:54,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,625 [root] DEBUG: Loader: Injecting process 2916 (thread 4032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2916
2020-02-14 15:53:54,640 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2916, ImageBase: 0x00400000
2020-02-14 15:53:54,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2916
2020-02-14 15:53:54,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,655 [root] DEBUG: Loader: Injecting process 2916 (thread 4032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2916
2020-02-14 15:53:54,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3512
2020-02-14 15:53:54,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,671 [root] DEBUG: Loader: Injecting process 3512 (thread 2688) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3512
2020-02-14 15:53:54,687 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3512, ImageBase: 0x00400000
2020-02-14 15:53:54,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3512
2020-02-14 15:53:54,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,703 [root] DEBUG: Loader: Injecting process 3512 (thread 2688) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3512
2020-02-14 15:53:54,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1912
2020-02-14 15:53:54,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,717 [root] DEBUG: Loader: Injecting process 1912 (thread 3596) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1912
2020-02-14 15:53:54,733 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1912, ImageBase: 0x00400000
2020-02-14 15:53:54,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1912
2020-02-14 15:53:54,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,750 [root] DEBUG: Loader: Injecting process 1912 (thread 3596) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1912
2020-02-14 15:53:54,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3904
2020-02-14 15:53:54,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,765 [root] DEBUG: Loader: Injecting process 3904 (thread 3824) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3904
2020-02-14 15:53:54,780 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3904, ImageBase: 0x00400000
2020-02-14 15:53:54,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3904
2020-02-14 15:53:54,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,796 [root] DEBUG: Loader: Injecting process 3904 (thread 3824) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3904
2020-02-14 15:53:54,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2352
2020-02-14 15:53:54,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,812 [root] DEBUG: Loader: Injecting process 2352 (thread 2104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2352
2020-02-14 15:53:54,828 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2352, ImageBase: 0x00400000
2020-02-14 15:53:54,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2352
2020-02-14 15:53:54,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,842 [root] DEBUG: Loader: Injecting process 2352 (thread 2104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2352
2020-02-14 15:53:54,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2900
2020-02-14 15:53:54,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,858 [root] DEBUG: Loader: Injecting process 2900 (thread 3060) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2900
2020-02-14 15:53:54,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2900, ImageBase: 0x00400000
2020-02-14 15:53:54,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2900
2020-02-14 15:53:54,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,890 [root] DEBUG: Loader: Injecting process 2900 (thread 3060) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2900
2020-02-14 15:53:54,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4080
2020-02-14 15:53:54,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,905 [root] DEBUG: Loader: Injecting process 4080 (thread 3812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4080
2020-02-14 15:53:54,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4080, ImageBase: 0x00400000
2020-02-14 15:53:54,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4080
2020-02-14 15:53:54,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,937 [root] DEBUG: Loader: Injecting process 4080 (thread 3812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4080
2020-02-14 15:53:54,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2172
2020-02-14 15:53:54,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,953 [root] DEBUG: Loader: Injecting process 2172 (thread 1388) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:54,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2172
2020-02-14 15:53:54,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2172, ImageBase: 0x00400000
2020-02-14 15:53:54,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2172
2020-02-14 15:53:54,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:54,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:54,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:54,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:54,983 [root] DEBUG: Loader: Injecting process 2172 (thread 1388) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:54,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:54,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:54,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2172
2020-02-14 15:53:55,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3752
2020-02-14 15:53:55,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,000 [root] DEBUG: Loader: Injecting process 3752 (thread 3540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3752
2020-02-14 15:53:55,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3752, ImageBase: 0x00400000
2020-02-14 15:53:55,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3752
2020-02-14 15:53:55,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,030 [root] DEBUG: Loader: Injecting process 3752 (thread 3540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3752
2020-02-14 15:53:55,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 900
2020-02-14 15:53:55,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,046 [root] DEBUG: Loader: Injecting process 900 (thread 1788) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 900
2020-02-14 15:53:55,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 900, ImageBase: 0x00400000
2020-02-14 15:53:55,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 900
2020-02-14 15:53:55,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,078 [root] DEBUG: Loader: Injecting process 900 (thread 1788) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 900
2020-02-14 15:53:55,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2892
2020-02-14 15:53:55,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,108 [root] DEBUG: Loader: Injecting process 2892 (thread 2500) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2892
2020-02-14 15:53:55,125 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2892, ImageBase: 0x00400000
2020-02-14 15:53:55,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2892
2020-02-14 15:53:55,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,140 [root] DEBUG: Loader: Injecting process 2892 (thread 2500) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2892
2020-02-14 15:53:55,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2972
2020-02-14 15:53:55,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,155 [root] DEBUG: Loader: Injecting process 2972 (thread 2932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,155 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2972
2020-02-14 15:53:55,171 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2972, ImageBase: 0x00400000
2020-02-14 15:53:55,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2972
2020-02-14 15:53:55,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,187 [root] DEBUG: Loader: Injecting process 2972 (thread 2932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2972
2020-02-14 15:53:55,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3800
2020-02-14 15:53:55,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,203 [root] DEBUG: Loader: Injecting process 3800 (thread 3772) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,203 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3800
2020-02-14 15:53:55,217 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3800, ImageBase: 0x00400000
2020-02-14 15:53:55,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3800
2020-02-14 15:53:55,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,233 [root] DEBUG: Loader: Injecting process 3800 (thread 3772) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3800
2020-02-14 15:53:55,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3228
2020-02-14 15:53:55,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,250 [root] DEBUG: Loader: Injecting process 3228 (thread 3532) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3228
2020-02-14 15:53:55,265 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3228, ImageBase: 0x00400000
2020-02-14 15:53:55,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3228
2020-02-14 15:53:55,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,280 [root] DEBUG: Loader: Injecting process 3228 (thread 3532) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3228
2020-02-14 15:53:55,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3220
2020-02-14 15:53:55,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,296 [root] DEBUG: Loader: Injecting process 3220 (thread 3264) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3220
2020-02-14 15:53:55,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 3220, ImageBase: 0x00400000
2020-02-14 15:53:55,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 3220
2020-02-14 15:53:55,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,342 [root] DEBUG: Loader: Injecting process 3220 (thread 3264) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 3220
2020-02-14 15:53:55,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4044
2020-02-14 15:53:55,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,358 [root] DEBUG: Loader: Injecting process 4044 (thread 3852) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4044
2020-02-14 15:53:55,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4044, ImageBase: 0x00400000
2020-02-14 15:53:55,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4044
2020-02-14 15:53:55,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,390 [root] DEBUG: Loader: Injecting process 4044 (thread 3852) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4044
2020-02-14 15:53:55,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 288
2020-02-14 15:53:55,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,405 [root] DEBUG: Loader: Injecting process 288 (thread 832) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 288
2020-02-14 15:53:55,421 [root] DEBUG: CreateProcessHandler: Injection info set for new process 288, ImageBase: 0x00400000
2020-02-14 15:53:55,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 288
2020-02-14 15:53:55,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,437 [root] DEBUG: Loader: Injecting process 288 (thread 832) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 288
2020-02-14 15:53:55,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2196
2020-02-14 15:53:55,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,453 [root] DEBUG: Loader: Injecting process 2196 (thread 400) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2196
2020-02-14 15:53:55,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2196, ImageBase: 0x00400000
2020-02-14 15:53:55,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2196
2020-02-14 15:53:55,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,483 [root] DEBUG: Loader: Injecting process 2196 (thread 400) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2196
2020-02-14 15:53:55,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4088
2020-02-14 15:53:55,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,515 [root] DEBUG: Loader: Injecting process 4088 (thread 4016) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4088
2020-02-14 15:53:55,530 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4088, ImageBase: 0x00400000
2020-02-14 15:53:55,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4088
2020-02-14 15:53:55,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,546 [root] DEBUG: Loader: Injecting process 4088 (thread 4016) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4088
2020-02-14 15:53:55,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2092
2020-02-14 15:53:55,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,578 [root] DEBUG: Loader: Injecting process 2092 (thread 3080) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2092
2020-02-14 15:53:55,592 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2092, ImageBase: 0x00400000
2020-02-14 15:53:55,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2092
2020-02-14 15:53:55,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,608 [root] DEBUG: Loader: Injecting process 2092 (thread 3080) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2092
2020-02-14 15:53:55,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4204
2020-02-14 15:53:55,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,625 [root] DEBUG: Loader: Injecting process 4204 (thread 4208) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4204
2020-02-14 15:53:55,640 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4204, ImageBase: 0x00400000
2020-02-14 15:53:55,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4204
2020-02-14 15:53:55,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,655 [root] DEBUG: Loader: Injecting process 4204 (thread 4208) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4204
2020-02-14 15:53:55,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4304
2020-02-14 15:53:55,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,671 [root] DEBUG: Loader: Injecting process 4304 (thread 4308) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4304
2020-02-14 15:53:55,687 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4304, ImageBase: 0x00400000
2020-02-14 15:53:55,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4304
2020-02-14 15:53:55,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,703 [root] DEBUG: Loader: Injecting process 4304 (thread 4308) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4304
2020-02-14 15:53:55,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4420
2020-02-14 15:53:55,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,717 [root] DEBUG: Loader: Injecting process 4420 (thread 4424) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4420
2020-02-14 15:53:55,733 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4420, ImageBase: 0x00400000
2020-02-14 15:53:55,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4420
2020-02-14 15:53:55,733 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,733 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,750 [root] DEBUG: Loader: Injecting process 4420 (thread 4424) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4420
2020-02-14 15:53:55,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4524
2020-02-14 15:53:55,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,765 [root] DEBUG: Loader: Injecting process 4524 (thread 4528) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4524
2020-02-14 15:53:55,780 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4524, ImageBase: 0x00400000
2020-02-14 15:53:55,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4524
2020-02-14 15:53:55,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,796 [root] DEBUG: Loader: Injecting process 4524 (thread 4528) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4524
2020-02-14 15:53:55,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4628
2020-02-14 15:53:55,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,812 [root] DEBUG: Loader: Injecting process 4628 (thread 4632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4628
2020-02-14 15:53:55,828 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4628, ImageBase: 0x00400000
2020-02-14 15:53:55,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4628
2020-02-14 15:53:55,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,842 [root] DEBUG: Loader: Injecting process 4628 (thread 4632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4628
2020-02-14 15:53:55,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4732
2020-02-14 15:53:55,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,858 [root] DEBUG: Loader: Injecting process 4732 (thread 4736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4732
2020-02-14 15:53:55,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4732, ImageBase: 0x00400000
2020-02-14 15:53:55,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4732
2020-02-14 15:53:55,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,890 [root] DEBUG: Loader: Injecting process 4732 (thread 4736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4732
2020-02-14 15:53:55,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4840
2020-02-14 15:53:55,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,905 [root] DEBUG: Loader: Injecting process 4840 (thread 4844) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4840
2020-02-14 15:53:55,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4840, ImageBase: 0x00400000
2020-02-14 15:53:55,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4840
2020-02-14 15:53:55,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,937 [root] DEBUG: Loader: Injecting process 4840 (thread 4844) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:55,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4840
2020-02-14 15:53:55,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4956
2020-02-14 15:53:55,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:55,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:55,967 [root] DEBUG: Loader: Injecting process 4956 (thread 4960) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:55,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:55,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:55,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4956
2020-02-14 15:53:55,983 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4956, ImageBase: 0x00400000
2020-02-14 15:53:55,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4956
2020-02-14 15:53:55,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:55,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:55,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,000 [root] DEBUG: Loader: Injecting process 4956 (thread 4960) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:56,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4956
2020-02-14 15:53:56,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5100
2020-02-14 15:53:56,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,015 [root] DEBUG: Loader: Injecting process 5100 (thread 5104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:56,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5100
2020-02-14 15:53:56,046 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5100, ImageBase: 0x00400000
2020-02-14 15:53:56,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5100
2020-02-14 15:53:56,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,046 [root] DEBUG: Loader: Injecting process 5100 (thread 5104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:56,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5100
2020-02-14 15:53:56,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5200
2020-02-14 15:53:56,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,062 [root] DEBUG: Loader: Injecting process 5200 (thread 5204) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:56,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5200
2020-02-14 15:53:56,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5200, ImageBase: 0x00400000
2020-02-14 15:53:56,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5200
2020-02-14 15:53:56,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,078 [root] DEBUG: Loader: Injecting process 5200 (thread 5204) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:56,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5200
2020-02-14 15:53:56,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5308
2020-02-14 15:53:56,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,108 [root] DEBUG: Loader: Injecting process 5308 (thread 5312) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:56,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5308
2020-02-14 15:53:56,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5308, ImageBase: 0x00400000
2020-02-14 15:53:56,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5308
2020-02-14 15:53:56,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,140 [root] DEBUG: Loader: Injecting process 5308 (thread 5312) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:56,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5308
2020-02-14 15:53:56,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5424
2020-02-14 15:53:56,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,187 [root] DEBUG: Loader: Injecting process 5424 (thread 5428) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:56,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5424
2020-02-14 15:53:56,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5424, ImageBase: 0x00400000
2020-02-14 15:53:56,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5424
2020-02-14 15:53:56,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,217 [root] DEBUG: Loader: Injecting process 5424 (thread 5428) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:56,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5424
2020-02-14 15:53:56,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5548
2020-02-14 15:53:56,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:56,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:56,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:56,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:56,233 [root] DEBUG: Loader: Injecting process 5548 (thread 5552) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:56,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:56,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:56,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5548
2020-02-14 15:53:56,265 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5548, ImageBase: 0x00400000
2020-02-14 15:53:56,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5548
2020-02-14 15:53:57,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,171 [root] DEBUG: Loader: Injecting process 5548 (thread 5552) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5548
2020-02-14 15:53:57,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5664
2020-02-14 15:53:57,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,187 [root] DEBUG: Loader: Injecting process 5664 (thread 5668) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5664
2020-02-14 15:53:57,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5664, ImageBase: 0x00400000
2020-02-14 15:53:57,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5664
2020-02-14 15:53:57,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,217 [root] DEBUG: Loader: Injecting process 5664 (thread 5668) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5664
2020-02-14 15:53:57,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5764
2020-02-14 15:53:57,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,233 [root] DEBUG: Loader: Injecting process 5764 (thread 5768) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5764
2020-02-14 15:53:57,250 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5764, ImageBase: 0x00400000
2020-02-14 15:53:57,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5764
2020-02-14 15:53:57,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,250 [root] DEBUG: Loader: Injecting process 5764 (thread 5768) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5764
2020-02-14 15:53:57,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5864
2020-02-14 15:53:57,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,390 [root] DEBUG: Loader: Injecting process 5864 (thread 5868) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5864
2020-02-14 15:53:57,405 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5864, ImageBase: 0x00400000
2020-02-14 15:53:57,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5864
2020-02-14 15:53:57,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,421 [root] DEBUG: Loader: Injecting process 5864 (thread 5868) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5864
2020-02-14 15:53:57,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5964
2020-02-14 15:53:57,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,437 [root] DEBUG: Loader: Injecting process 5964 (thread 5968) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5964
2020-02-14 15:53:57,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5964, ImageBase: 0x00400000
2020-02-14 15:53:57,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5964
2020-02-14 15:53:57,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,467 [root] DEBUG: Loader: Injecting process 5964 (thread 5968) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5964
2020-02-14 15:53:57,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6064
2020-02-14 15:53:57,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,500 [root] DEBUG: Loader: Injecting process 6064 (thread 6068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6064
2020-02-14 15:53:57,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6064, ImageBase: 0x00400000
2020-02-14 15:53:57,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6064
2020-02-14 15:53:57,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,530 [root] DEBUG: Loader: Injecting process 6064 (thread 6068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6064
2020-02-14 15:53:57,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4108
2020-02-14 15:53:57,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,562 [root] DEBUG: Loader: Injecting process 4108 (thread 4112) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4108
2020-02-14 15:53:57,592 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4108, ImageBase: 0x00400000
2020-02-14 15:53:57,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4108
2020-02-14 15:53:57,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,592 [root] DEBUG: Loader: Injecting process 4108 (thread 4112) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4108
2020-02-14 15:53:57,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4252
2020-02-14 15:53:57,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,625 [root] DEBUG: Loader: Injecting process 4252 (thread 4256) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4252
2020-02-14 15:53:57,640 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4252, ImageBase: 0x00400000
2020-02-14 15:53:57,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4252
2020-02-14 15:53:57,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,655 [root] DEBUG: Loader: Injecting process 4252 (thread 4256) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4252
2020-02-14 15:53:57,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4384
2020-02-14 15:53:57,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,671 [root] DEBUG: Loader: Injecting process 4384 (thread 4388) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4384
2020-02-14 15:53:57,687 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4384, ImageBase: 0x00400000
2020-02-14 15:53:57,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4384
2020-02-14 15:53:57,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,703 [root] DEBUG: Loader: Injecting process 4384 (thread 4388) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4384
2020-02-14 15:53:57,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4488
2020-02-14 15:53:57,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,717 [root] DEBUG: Loader: Injecting process 4488 (thread 4476) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4488
2020-02-14 15:53:57,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4488, ImageBase: 0x00400000
2020-02-14 15:53:57,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4488
2020-02-14 15:53:57,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,750 [root] DEBUG: Loader: Injecting process 4488 (thread 4476) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4488
2020-02-14 15:53:57,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4620
2020-02-14 15:53:57,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,765 [root] DEBUG: Loader: Injecting process 4620 (thread 4656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4620
2020-02-14 15:53:57,780 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4620, ImageBase: 0x00400000
2020-02-14 15:53:57,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4620
2020-02-14 15:53:57,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,796 [root] DEBUG: Loader: Injecting process 4620 (thread 4656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4620
2020-02-14 15:53:57,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4772
2020-02-14 15:53:57,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,812 [root] DEBUG: Loader: Injecting process 4772 (thread 4776) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4772
2020-02-14 15:53:57,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4772, ImageBase: 0x00400000
2020-02-14 15:53:57,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4772
2020-02-14 15:53:57,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,858 [root] DEBUG: Loader: Injecting process 4772 (thread 4776) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4772
2020-02-14 15:53:57,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4856
2020-02-14 15:53:57,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,875 [root] DEBUG: Loader: Injecting process 4856 (thread 4888) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4856
2020-02-14 15:53:57,905 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4856, ImageBase: 0x00400000
2020-02-14 15:53:57,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4856
2020-02-14 15:53:57,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,905 [root] DEBUG: Loader: Injecting process 4856 (thread 4888) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4856
2020-02-14 15:53:57,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5056
2020-02-14 15:53:57,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,937 [root] DEBUG: Loader: Injecting process 5056 (thread 5060) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:57,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5056
2020-02-14 15:53:57,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5056, ImageBase: 0x00400000
2020-02-14 15:53:57,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5056
2020-02-14 15:53:57,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:57,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:57,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:57,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:57,967 [root] DEBUG: Loader: Injecting process 5056 (thread 5060) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:57,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:57,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:57,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5056
2020-02-14 15:53:58,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5188
2020-02-14 15:53:58,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,125 [root] DEBUG: Loader: Injecting process 5188 (thread 5164) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5188
2020-02-14 15:53:58,155 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5188, ImageBase: 0x00400000
2020-02-14 15:53:58,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5188
2020-02-14 15:53:58,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,155 [root] DEBUG: Loader: Injecting process 5188 (thread 5164) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5188
2020-02-14 15:53:58,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5260
2020-02-14 15:53:58,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,187 [root] DEBUG: Loader: Injecting process 5260 (thread 5292) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5260
2020-02-14 15:53:58,217 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5260, ImageBase: 0x00400000
2020-02-14 15:53:58,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5260
2020-02-14 15:53:58,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,217 [root] DEBUG: Loader: Injecting process 5260 (thread 5292) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5260
2020-02-14 15:53:58,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5476
2020-02-14 15:53:58,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,250 [root] DEBUG: Loader: Injecting process 5476 (thread 5480) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5476
2020-02-14 15:53:58,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5476, ImageBase: 0x00400000
2020-02-14 15:53:58,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5476
2020-02-14 15:53:58,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,280 [root] DEBUG: Loader: Injecting process 5476 (thread 5480) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5476
2020-02-14 15:53:58,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5596
2020-02-14 15:53:58,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,530 [root] DEBUG: Loader: Injecting process 5596 (thread 5572) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5596
2020-02-14 15:53:58,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5596, ImageBase: 0x00400000
2020-02-14 15:53:58,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5596
2020-02-14 15:53:58,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,562 [root] DEBUG: Loader: Injecting process 5596 (thread 5572) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5596
2020-02-14 15:53:58,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5712
2020-02-14 15:53:58,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,578 [root] DEBUG: Loader: Injecting process 5712 (thread 5716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5712
2020-02-14 15:53:58,592 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5712, ImageBase: 0x00400000
2020-02-14 15:53:58,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5712
2020-02-14 15:53:58,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,608 [root] DEBUG: Loader: Injecting process 5712 (thread 5716) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5712
2020-02-14 15:53:58,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5844
2020-02-14 15:53:58,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,640 [root] DEBUG: Loader: Injecting process 5844 (thread 5848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5844
2020-02-14 15:53:58,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5844, ImageBase: 0x00400000
2020-02-14 15:53:58,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5844
2020-02-14 15:53:58,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,671 [root] DEBUG: Loader: Injecting process 5844 (thread 5848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5844
2020-02-14 15:53:58,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5932
2020-02-14 15:53:58,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,703 [root] DEBUG: Loader: Injecting process 5932 (thread 5920) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5932
2020-02-14 15:53:58,733 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5932, ImageBase: 0x00400000
2020-02-14 15:53:58,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5932
2020-02-14 15:53:58,733 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,733 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,733 [root] DEBUG: Loader: Injecting process 5932 (thread 5920) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5932
2020-02-14 15:53:58,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6060
2020-02-14 15:53:58,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,765 [root] DEBUG: Loader: Injecting process 6060 (thread 6092) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6060
2020-02-14 15:53:58,780 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6060, ImageBase: 0x00400000
2020-02-14 15:53:58,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6060
2020-02-14 15:53:58,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,796 [root] DEBUG: Loader: Injecting process 6060 (thread 6092) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6060
2020-02-14 15:53:58,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4176
2020-02-14 15:53:58,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,812 [root] DEBUG: Loader: Injecting process 4176 (thread 4152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4176
2020-02-14 15:53:58,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4176, ImageBase: 0x00400000
2020-02-14 15:53:58,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4176
2020-02-14 15:53:58,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,875 [root] DEBUG: Loader: Injecting process 4176 (thread 4152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4176
2020-02-14 15:53:58,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4284
2020-02-14 15:53:58,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,890 [root] DEBUG: Loader: Injecting process 4284 (thread 4300) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4284
2020-02-14 15:53:58,905 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4284, ImageBase: 0x00400000
2020-02-14 15:53:58,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4284
2020-02-14 15:53:58,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,921 [root] DEBUG: Loader: Injecting process 4284 (thread 4300) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:58,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4284
2020-02-14 15:53:58,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4492
2020-02-14 15:53:58,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:58,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:58,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:58,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:58,967 [root] DEBUG: Loader: Injecting process 4492 (thread 4496) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:58,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:58,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:58,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4492
2020-02-14 15:53:59,000 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4492, ImageBase: 0x00400000
2020-02-14 15:53:59,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4492
2020-02-14 15:53:59,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,000 [root] DEBUG: Loader: Injecting process 4492 (thread 4496) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4492
2020-02-14 15:53:59,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4600
2020-02-14 15:53:59,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,015 [root] DEBUG: Loader: Injecting process 4600 (thread 4604) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4600
2020-02-14 15:53:59,046 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4600, ImageBase: 0x00400000
2020-02-14 15:53:59,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4600
2020-02-14 15:53:59,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,062 [root] DEBUG: Loader: Injecting process 4600 (thread 4604) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4600
2020-02-14 15:53:59,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4764
2020-02-14 15:53:59,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,078 [root] DEBUG: Loader: Injecting process 4764 (thread 4768) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4764
2020-02-14 15:53:59,092 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4764, ImageBase: 0x00400000
2020-02-14 15:53:59,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4764
2020-02-14 15:53:59,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,108 [root] DEBUG: Loader: Injecting process 4764 (thread 4768) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4764
2020-02-14 15:53:59,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4908
2020-02-14 15:53:59,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,125 [root] DEBUG: Loader: Injecting process 4908 (thread 4896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4908
2020-02-14 15:53:59,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4908, ImageBase: 0x00400000
2020-02-14 15:53:59,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4908
2020-02-14 15:53:59,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,155 [root] DEBUG: Loader: Injecting process 4908 (thread 4896) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4908
2020-02-14 15:53:59,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5052
2020-02-14 15:53:59,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,171 [root] DEBUG: Loader: Injecting process 5052 (thread 5072) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5052
2020-02-14 15:53:59,187 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5052, ImageBase: 0x00400000
2020-02-14 15:53:59,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5052
2020-02-14 15:53:59,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,203 [root] DEBUG: Loader: Injecting process 5052 (thread 5072) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,203 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5052
2020-02-14 15:53:59,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5276
2020-02-14 15:53:59,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,217 [root] DEBUG: Loader: Injecting process 5276 (thread 5280) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5276
2020-02-14 15:53:59,250 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5276, ImageBase: 0x00400000
2020-02-14 15:53:59,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5276
2020-02-14 15:53:59,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,250 [root] DEBUG: Loader: Injecting process 5276 (thread 5280) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5276
2020-02-14 15:53:59,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5400
2020-02-14 15:53:59,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,280 [root] DEBUG: Loader: Injecting process 5400 (thread 5392) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5400
2020-02-14 15:53:59,312 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5400, ImageBase: 0x00400000
2020-02-14 15:53:59,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5400
2020-02-14 15:53:59,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,312 [root] DEBUG: Loader: Injecting process 5400 (thread 5392) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5400
2020-02-14 15:53:59,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5512
2020-02-14 15:53:59,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,342 [root] DEBUG: Loader: Injecting process 5512 (thread 5588) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5512
2020-02-14 15:53:59,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5512, ImageBase: 0x00400000
2020-02-14 15:53:59,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5512
2020-02-14 15:53:59,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,530 [root] DEBUG: Loader: Injecting process 5512 (thread 5588) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5512
2020-02-14 15:53:59,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5732
2020-02-14 15:53:59,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,592 [root] DEBUG: Loader: Injecting process 5732 (thread 5720) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5732
2020-02-14 15:53:59,608 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5732, ImageBase: 0x00400000
2020-02-14 15:53:59,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5732
2020-02-14 15:53:59,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,625 [root] DEBUG: Loader: Injecting process 5732 (thread 5720) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5732
2020-02-14 15:53:59,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5820
2020-02-14 15:53:59,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,640 [root] DEBUG: Loader: Injecting process 5820 (thread 5824) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5820
2020-02-14 15:53:59,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5820, ImageBase: 0x00400000
2020-02-14 15:53:59,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5820
2020-02-14 15:53:59,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,671 [root] DEBUG: Loader: Injecting process 5820 (thread 5824) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5820
2020-02-14 15:53:59,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6012
2020-02-14 15:53:59,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,687 [root] DEBUG: Loader: Injecting process 6012 (thread 6048) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6012
2020-02-14 15:53:59,703 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6012, ImageBase: 0x00400000
2020-02-14 15:53:59,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6012
2020-02-14 15:53:59,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,717 [root] DEBUG: Loader: Injecting process 6012 (thread 6048) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6012
2020-02-14 15:53:59,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4132
2020-02-14 15:53:59,733 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,733 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,733 [root] DEBUG: Loader: Injecting process 4132 (thread 4164) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4132
2020-02-14 15:53:59,765 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4132, ImageBase: 0x00400000
2020-02-14 15:53:59,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4132
2020-02-14 15:53:59,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,765 [root] DEBUG: Loader: Injecting process 4132 (thread 4164) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4132
2020-02-14 15:53:59,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4148
2020-02-14 15:53:59,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,780 [root] DEBUG: Loader: Injecting process 4148 (thread 4180) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4148
2020-02-14 15:53:59,796 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4148, ImageBase: 0x00400000
2020-02-14 15:53:59,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4148
2020-02-14 15:53:59,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,812 [root] DEBUG: Loader: Injecting process 4148 (thread 4180) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4148
2020-02-14 15:53:59,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4444
2020-02-14 15:53:59,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,828 [root] DEBUG: Loader: Injecting process 4444 (thread 4508) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4444
2020-02-14 15:53:59,858 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4444, ImageBase: 0x00400000
2020-02-14 15:53:59,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4444
2020-02-14 15:53:59,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,858 [root] DEBUG: Loader: Injecting process 4444 (thread 4508) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4444
2020-02-14 15:53:59,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4672
2020-02-14 15:53:59,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,875 [root] DEBUG: Loader: Injecting process 4672 (thread 4616) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4672
2020-02-14 15:53:59,890 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4672, ImageBase: 0x00400000
2020-02-14 15:53:59,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4672
2020-02-14 15:53:59,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,905 [root] DEBUG: Loader: Injecting process 4672 (thread 4616) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4672
2020-02-14 15:53:59,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4868
2020-02-14 15:53:59,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,921 [root] DEBUG: Loader: Injecting process 4868 (thread 4872) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4868
2020-02-14 15:53:59,937 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4868, ImageBase: 0x00400000
2020-02-14 15:53:59,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4868
2020-02-14 15:53:59,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,953 [root] DEBUG: Loader: Injecting process 4868 (thread 4872) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:53:59,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4868
2020-02-14 15:53:59,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5044
2020-02-14 15:53:59,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:53:59,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:53:59,967 [root] DEBUG: Loader: Injecting process 5044 (thread 5076) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:53:59,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:53:59,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:53:59,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5044
2020-02-14 15:53:59,983 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5044, ImageBase: 0x00400000
2020-02-14 15:53:59,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5044
2020-02-14 15:53:59,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:53:59,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:53:59,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,000 [root] DEBUG: Loader: Injecting process 5044 (thread 5076) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5044
2020-02-14 15:54:00,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5236
2020-02-14 15:54:00,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,015 [root] DEBUG: Loader: Injecting process 5236 (thread 5184) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5236
2020-02-14 15:54:00,030 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5236, ImageBase: 0x00400000
2020-02-14 15:54:00,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5236
2020-02-14 15:54:00,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,046 [root] DEBUG: Loader: Injecting process 5236 (thread 5184) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5236
2020-02-14 15:54:00,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5368
2020-02-14 15:54:00,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,062 [root] DEBUG: Loader: Injecting process 5368 (thread 5444) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5368
2020-02-14 15:54:00,092 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5368, ImageBase: 0x00400000
2020-02-14 15:54:00,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5368
2020-02-14 15:54:00,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,092 [root] DEBUG: Loader: Injecting process 5368 (thread 5444) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5368
2020-02-14 15:54:00,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5600
2020-02-14 15:54:00,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,108 [root] DEBUG: Loader: Injecting process 5600 (thread 5632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5600
2020-02-14 15:54:00,125 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5600, ImageBase: 0x00400000
2020-02-14 15:54:00,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5600
2020-02-14 15:54:00,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,140 [root] DEBUG: Loader: Injecting process 5600 (thread 5632) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5600
2020-02-14 15:54:00,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5748
2020-02-14 15:54:00,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,155 [root] DEBUG: Loader: Injecting process 5748 (thread 5812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,155 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5748
2020-02-14 15:54:00,171 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5748, ImageBase: 0x00400000
2020-02-14 15:54:00,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5748
2020-02-14 15:54:00,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,187 [root] DEBUG: Loader: Injecting process 5748 (thread 5812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5748
2020-02-14 15:54:00,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5984
2020-02-14 15:54:00,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,203 [root] DEBUG: Loader: Injecting process 5984 (thread 5988) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,203 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5984
2020-02-14 15:54:00,217 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5984, ImageBase: 0x00400000
2020-02-14 15:54:00,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5984
2020-02-14 15:54:00,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,233 [root] DEBUG: Loader: Injecting process 5984 (thread 5988) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,233 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5984
2020-02-14 15:54:00,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6136
2020-02-14 15:54:00,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,250 [root] DEBUG: Loader: Injecting process 6136 (thread 6108) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6136
2020-02-14 15:54:00,265 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6136, ImageBase: 0x00400000
2020-02-14 15:54:00,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6136
2020-02-14 15:54:00,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,280 [root] DEBUG: Loader: Injecting process 6136 (thread 6108) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6136
2020-02-14 15:54:00,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4228
2020-02-14 15:54:00,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,296 [root] DEBUG: Loader: Injecting process 4228 (thread 4220) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4228
2020-02-14 15:54:00,312 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4228, ImageBase: 0x00400000
2020-02-14 15:54:00,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4228
2020-02-14 15:54:00,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,328 [root] DEBUG: Loader: Injecting process 4228 (thread 4220) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4228
2020-02-14 15:54:00,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4544
2020-02-14 15:54:00,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,342 [root] DEBUG: Loader: Injecting process 4544 (thread 4540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4544
2020-02-14 15:54:00,358 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4544, ImageBase: 0x00400000
2020-02-14 15:54:00,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4544
2020-02-14 15:54:00,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,375 [root] DEBUG: Loader: Injecting process 4544 (thread 4540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4544
2020-02-14 15:54:00,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4720
2020-02-14 15:54:00,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,405 [root] DEBUG: Loader: Injecting process 4720 (thread 4648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4720
2020-02-14 15:54:00,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4720, ImageBase: 0x00400000
2020-02-14 15:54:00,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4720
2020-02-14 15:54:00,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,437 [root] DEBUG: Loader: Injecting process 4720 (thread 4648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4720
2020-02-14 15:54:00,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4916
2020-02-14 15:54:00,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,467 [root] DEBUG: Loader: Injecting process 4916 (thread 4932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4916
2020-02-14 15:54:00,483 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4916, ImageBase: 0x00400000
2020-02-14 15:54:00,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4916
2020-02-14 15:54:00,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,500 [root] DEBUG: Loader: Injecting process 4916 (thread 4932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4916
2020-02-14 15:54:00,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5196
2020-02-14 15:54:00,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,515 [root] DEBUG: Loader: Injecting process 5196 (thread 5116) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5196
2020-02-14 15:54:00,530 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5196, ImageBase: 0x00400000
2020-02-14 15:54:00,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5196
2020-02-14 15:54:00,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,546 [root] DEBUG: Loader: Injecting process 5196 (thread 5116) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5196
2020-02-14 15:54:00,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5340
2020-02-14 15:54:00,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,562 [root] DEBUG: Loader: Injecting process 5340 (thread 5356) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5340
2020-02-14 15:54:00,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5340, ImageBase: 0x00400000
2020-02-14 15:54:00,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5340
2020-02-14 15:54:00,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,592 [root] DEBUG: Loader: Injecting process 5340 (thread 5356) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5340
2020-02-14 15:54:00,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5692
2020-02-14 15:54:00,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,608 [root] DEBUG: Loader: Injecting process 5692 (thread 5624) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5692
2020-02-14 15:54:00,625 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5692, ImageBase: 0x00400000
2020-02-14 15:54:00,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5692
2020-02-14 15:54:00,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,640 [root] DEBUG: Loader: Injecting process 5692 (thread 5624) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5692
2020-02-14 15:54:00,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5856
2020-02-14 15:54:00,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,655 [root] DEBUG: Loader: Injecting process 5856 (thread 5860) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5856
2020-02-14 15:54:00,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5856, ImageBase: 0x00400000
2020-02-14 15:54:00,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5856
2020-02-14 15:54:00,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,687 [root] DEBUG: Loader: Injecting process 5856 (thread 5860) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5856
2020-02-14 15:54:00,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6024
2020-02-14 15:54:00,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,703 [root] DEBUG: Loader: Injecting process 6024 (thread 6088) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6024
2020-02-14 15:54:00,717 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6024, ImageBase: 0x00400000
2020-02-14 15:54:00,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6024
2020-02-14 15:54:00,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,733 [root] DEBUG: Loader: Injecting process 6024 (thread 6088) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6024
2020-02-14 15:54:00,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4184
2020-02-14 15:54:00,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,750 [root] DEBUG: Loader: Injecting process 4184 (thread 4232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4184
2020-02-14 15:54:00,765 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4184, ImageBase: 0x00400000
2020-02-14 15:54:00,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4184
2020-02-14 15:54:00,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,765 [root] DEBUG: Loader: Injecting process 4184 (thread 4232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4184
2020-02-14 15:54:00,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4452
2020-02-14 15:54:00,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,796 [root] DEBUG: Loader: Injecting process 4452 (thread 4396) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4452
2020-02-14 15:54:00,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4452, ImageBase: 0x00400000
2020-02-14 15:54:00,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4452
2020-02-14 15:54:00,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,812 [root] DEBUG: Loader: Injecting process 4452 (thread 4396) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4452
2020-02-14 15:54:00,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4800
2020-02-14 15:54:00,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,842 [root] DEBUG: Loader: Injecting process 4800 (thread 4816) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4800
2020-02-14 15:54:00,858 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4800, ImageBase: 0x00400000
2020-02-14 15:54:00,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4800
2020-02-14 15:54:00,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,858 [root] DEBUG: Loader: Injecting process 4800 (thread 4816) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4800
2020-02-14 15:54:00,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5128
2020-02-14 15:54:00,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,890 [root] DEBUG: Loader: Injecting process 5128 (thread 4980) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,890 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5128
2020-02-14 15:54:00,905 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5128, ImageBase: 0x00400000
2020-02-14 15:54:00,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5128
2020-02-14 15:54:00,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,905 [root] DEBUG: Loader: Injecting process 5128 (thread 4980) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,921 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5128
2020-02-14 15:54:00,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5216
2020-02-14 15:54:00,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,937 [root] DEBUG: Loader: Injecting process 5216 (thread 5248) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:00,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5216
2020-02-14 15:54:00,953 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5216, ImageBase: 0x00400000
2020-02-14 15:54:00,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5216
2020-02-14 15:54:00,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:00,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:00,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:00,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:00,953 [root] DEBUG: Loader: Injecting process 5216 (thread 5248) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:00,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:00,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:00,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5216
2020-02-14 15:54:00,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5508
2020-02-14 15:54:04,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,000 [root] DEBUG: Loader: Injecting process 5508 (thread 5584) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5508
2020-02-14 15:54:04,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5508, ImageBase: 0x00400000
2020-02-14 15:54:04,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5508
2020-02-14 15:54:04,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,030 [root] DEBUG: Loader: Injecting process 5508 (thread 5584) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5508
2020-02-14 15:54:04,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5728
2020-02-14 15:54:04,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,375 [root] DEBUG: Loader: Injecting process 5728 (thread 5804) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5728
2020-02-14 15:54:04,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5728, ImageBase: 0x00400000
2020-02-14 15:54:04,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5728
2020-02-14 15:54:04,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,421 [root] DEBUG: Loader: Injecting process 5728 (thread 5804) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5728
2020-02-14 15:54:04,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6020
2020-02-14 15:54:04,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,437 [root] DEBUG: Loader: Injecting process 6020 (thread 4116) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6020
2020-02-14 15:54:04,453 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6020, ImageBase: 0x00400000
2020-02-14 15:54:04,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6020
2020-02-14 15:54:04,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,467 [root] DEBUG: Loader: Injecting process 6020 (thread 4116) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6020
2020-02-14 15:54:04,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4144
2020-02-14 15:54:04,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,483 [root] DEBUG: Loader: Injecting process 4144 (thread 4224) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4144
2020-02-14 15:54:04,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4144, ImageBase: 0x00400000
2020-02-14 15:54:04,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4144
2020-02-14 15:54:04,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,515 [root] DEBUG: Loader: Injecting process 4144 (thread 4224) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4144
2020-02-14 15:54:04,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4696
2020-02-14 15:54:04,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,530 [root] DEBUG: Loader: Injecting process 4696 (thread 4556) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4696
2020-02-14 15:54:04,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4696, ImageBase: 0x00400000
2020-02-14 15:54:04,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4696
2020-02-14 15:54:04,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,562 [root] DEBUG: Loader: Injecting process 4696 (thread 4556) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4696
2020-02-14 15:54:04,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5028
2020-02-14 15:54:04,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,858 [root] DEBUG: Loader: Injecting process 5028 (thread 4876) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5028
2020-02-14 15:54:04,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5028, ImageBase: 0x00400000
2020-02-14 15:54:04,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5028
2020-02-14 15:54:04,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,890 [root] DEBUG: Loader: Injecting process 5028 (thread 4876) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5028
2020-02-14 15:54:04,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5244
2020-02-14 15:54:04,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,905 [root] DEBUG: Loader: Injecting process 5244 (thread 5232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5244
2020-02-14 15:54:04,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5244, ImageBase: 0x00400000
2020-02-14 15:54:04,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5244
2020-02-14 15:54:04,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,937 [root] DEBUG: Loader: Injecting process 5244 (thread 5232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5244
2020-02-14 15:54:04,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5468
2020-02-14 15:54:04,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,953 [root] DEBUG: Loader: Injecting process 5468 (thread 5536) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:04,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5468
2020-02-14 15:54:04,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5468, ImageBase: 0x00400000
2020-02-14 15:54:04,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5468
2020-02-14 15:54:04,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:04,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:04,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:04,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:04,983 [root] DEBUG: Loader: Injecting process 5468 (thread 5536) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:04,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:04,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:04,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5468
2020-02-14 15:54:05,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5752
2020-02-14 15:54:05,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,000 [root] DEBUG: Loader: Injecting process 5752 (thread 5608) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5752
2020-02-14 15:54:05,030 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5752, ImageBase: 0x00400000
2020-02-14 15:54:05,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5752
2020-02-14 15:54:05,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,030 [root] DEBUG: Loader: Injecting process 5752 (thread 5608) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5752
2020-02-14 15:54:05,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6056
2020-02-14 15:54:05,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,046 [root] DEBUG: Loader: Injecting process 6056 (thread 4240) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6056
2020-02-14 15:54:05,062 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6056, ImageBase: 0x00400000
2020-02-14 15:54:05,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6056
2020-02-14 15:54:05,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,078 [root] DEBUG: Loader: Injecting process 6056 (thread 4240) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6056
2020-02-14 15:54:05,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4448
2020-02-14 15:54:05,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,092 [root] DEBUG: Loader: Injecting process 4448 (thread 4328) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4448
2020-02-14 15:54:05,125 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4448, ImageBase: 0x00400000
2020-02-14 15:54:05,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4448
2020-02-14 15:54:05,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,125 [root] DEBUG: Loader: Injecting process 4448 (thread 4328) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4448
2020-02-14 15:54:05,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4588
2020-02-14 15:54:05,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,578 [root] DEBUG: Loader: Injecting process 4588 (thread 4712) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4588
2020-02-14 15:54:05,608 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4588, ImageBase: 0x00400000
2020-02-14 15:54:05,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4588
2020-02-14 15:54:05,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,608 [root] DEBUG: Loader: Injecting process 4588 (thread 4712) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4588
2020-02-14 15:54:05,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5252
2020-02-14 15:54:05,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,717 [root] DEBUG: Loader: Injecting process 5252 (thread 5272) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5252
2020-02-14 15:54:05,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5252, ImageBase: 0x00400000
2020-02-14 15:54:05,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5252
2020-02-14 15:54:05,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,750 [root] DEBUG: Loader: Injecting process 5252 (thread 5272) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,765 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5252
2020-02-14 15:54:05,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5580
2020-02-14 15:54:05,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,796 [root] DEBUG: Loader: Injecting process 5580 (thread 548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5580
2020-02-14 15:54:05,828 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5580, ImageBase: 0x00400000
2020-02-14 15:54:05,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5580
2020-02-14 15:54:05,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,828 [root] DEBUG: Loader: Injecting process 5580 (thread 548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5580
2020-02-14 15:54:05,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5684
2020-02-14 15:54:05,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,858 [root] DEBUG: Loader: Injecting process 5684 (thread 5780) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5684
2020-02-14 15:54:05,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5684, ImageBase: 0x00400000
2020-02-14 15:54:05,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5684
2020-02-14 15:54:05,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,890 [root] DEBUG: Loader: Injecting process 5684 (thread 5780) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5684
2020-02-14 15:54:05,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4260
2020-02-14 15:54:05,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,905 [root] DEBUG: Loader: Injecting process 4260 (thread 4124) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4260
2020-02-14 15:54:05,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4260, ImageBase: 0x00400000
2020-02-14 15:54:05,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4260
2020-02-14 15:54:05,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,937 [root] DEBUG: Loader: Injecting process 4260 (thread 4124) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4260
2020-02-14 15:54:05,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4400
2020-02-14 15:54:05,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,953 [root] DEBUG: Loader: Injecting process 4400 (thread 4372) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:05,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4400
2020-02-14 15:54:05,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4400, ImageBase: 0x00400000
2020-02-14 15:54:05,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4400
2020-02-14 15:54:05,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:05,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:05,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:05,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:05,983 [root] DEBUG: Loader: Injecting process 4400 (thread 4372) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:05,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:05,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:05,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4400
2020-02-14 15:54:06,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5020
2020-02-14 15:54:06,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,108 [root] DEBUG: Loader: Injecting process 5020 (thread 5036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5020
2020-02-14 15:54:06,125 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5020, ImageBase: 0x00400000
2020-02-14 15:54:06,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5020
2020-02-14 15:54:06,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,140 [root] DEBUG: Loader: Injecting process 5020 (thread 5036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5020
2020-02-14 15:54:06,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5524
2020-02-14 15:54:06,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,296 [root] DEBUG: Loader: Injecting process 5524 (thread 5264) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5524
2020-02-14 15:54:06,312 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5524, ImageBase: 0x00400000
2020-02-14 15:54:06,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5524
2020-02-14 15:54:06,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,328 [root] DEBUG: Loader: Injecting process 5524 (thread 5264) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5524
2020-02-14 15:54:06,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5784
2020-02-14 15:54:06,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,342 [root] DEBUG: Loader: Injecting process 5784 (thread 5636) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5784
2020-02-14 15:54:06,358 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5784, ImageBase: 0x00400000
2020-02-14 15:54:06,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5784
2020-02-14 15:54:06,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,358 [root] DEBUG: Loader: Injecting process 5784 (thread 5636) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,375 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5784
2020-02-14 15:54:06,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4128
2020-02-14 15:54:06,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,390 [root] DEBUG: Loader: Injecting process 4128 (thread 4244) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4128
2020-02-14 15:54:06,421 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4128, ImageBase: 0x00400000
2020-02-14 15:54:06,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4128
2020-02-14 15:54:06,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,437 [root] DEBUG: Loader: Injecting process 4128 (thread 4244) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4128
2020-02-14 15:54:06,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4724
2020-02-14 15:54:06,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,453 [root] DEBUG: Loader: Injecting process 4724 (thread 4684) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4724
2020-02-14 15:54:06,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4724, ImageBase: 0x00400000
2020-02-14 15:54:06,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4724
2020-02-14 15:54:06,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,483 [root] DEBUG: Loader: Injecting process 4724 (thread 4684) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4724
2020-02-14 15:54:06,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5172
2020-02-14 15:54:06,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,515 [root] DEBUG: Loader: Injecting process 5172 (thread 5268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5172
2020-02-14 15:54:06,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5172, ImageBase: 0x00400000
2020-02-14 15:54:06,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5172
2020-02-14 15:54:06,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,546 [root] DEBUG: Loader: Injecting process 5172 (thread 5268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5172
2020-02-14 15:54:06,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5800
2020-02-14 15:54:06,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,671 [root] DEBUG: Loader: Injecting process 5800 (thread 5504) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5800
2020-02-14 15:54:06,687 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5800, ImageBase: 0x00400000
2020-02-14 15:54:06,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5800
2020-02-14 15:54:06,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,703 [root] DEBUG: Loader: Injecting process 5800 (thread 5504) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5800
2020-02-14 15:54:06,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6004
2020-02-14 15:54:06,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,765 [root] DEBUG: Loader: Injecting process 6004 (thread 6016) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6004
2020-02-14 15:54:06,796 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6004, ImageBase: 0x00400000
2020-02-14 15:54:06,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6004
2020-02-14 15:54:06,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,796 [root] DEBUG: Loader: Injecting process 6004 (thread 6016) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6004
2020-02-14 15:54:06,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4516
2020-02-14 15:54:06,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,828 [root] DEBUG: Loader: Injecting process 4516 (thread 4364) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4516
2020-02-14 15:54:06,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4516, ImageBase: 0x00400000
2020-02-14 15:54:06,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4516
2020-02-14 15:54:06,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,858 [root] DEBUG: Loader: Injecting process 4516 (thread 4364) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4516
2020-02-14 15:54:06,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5048
2020-02-14 15:54:06,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,875 [root] DEBUG: Loader: Injecting process 5048 (thread 5380) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5048
2020-02-14 15:54:06,890 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5048, ImageBase: 0x00400000
2020-02-14 15:54:06,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5048
2020-02-14 15:54:06,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,905 [root] DEBUG: Loader: Injecting process 5048 (thread 5380) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5048
2020-02-14 15:54:06,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5532
2020-02-14 15:54:06,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,921 [root] DEBUG: Loader: Injecting process 5532 (thread 5452) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:06,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5532
2020-02-14 15:54:06,937 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5532, ImageBase: 0x00400000
2020-02-14 15:54:06,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5532
2020-02-14 15:54:06,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:06,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:06,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:06,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:06,953 [root] DEBUG: Loader: Injecting process 5532 (thread 5452) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:06,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:06,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:06,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5532
2020-02-14 15:54:06,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4668
2020-02-14 15:54:07,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,140 [root] DEBUG: Loader: Injecting process 4668 (thread 4784) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4668
2020-02-14 15:54:07,171 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4668, ImageBase: 0x00400000
2020-02-14 15:54:07,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4668
2020-02-14 15:54:07,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,171 [root] DEBUG: Loader: Injecting process 4668 (thread 4784) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4668
2020-02-14 15:54:07,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5240
2020-02-14 15:54:07,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,187 [root] DEBUG: Loader: Injecting process 5240 (thread 4996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5240
2020-02-14 15:54:07,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5240, ImageBase: 0x00400000
2020-02-14 15:54:07,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5240
2020-02-14 15:54:07,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,217 [root] DEBUG: Loader: Injecting process 5240 (thread 4996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5240
2020-02-14 15:54:07,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5416
2020-02-14 15:54:07,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,233 [root] DEBUG: Loader: Injecting process 5416 (thread 5948) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5416
2020-02-14 15:54:07,250 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5416, ImageBase: 0x00400000
2020-02-14 15:54:07,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5416
2020-02-14 15:54:07,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,265 [root] DEBUG: Loader: Injecting process 5416 (thread 5948) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5416
2020-02-14 15:54:07,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4592
2020-02-14 15:54:07,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,280 [root] DEBUG: Loader: Injecting process 4592 (thread 4356) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4592
2020-02-14 15:54:07,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4592, ImageBase: 0x00400000
2020-02-14 15:54:07,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4592
2020-02-14 15:54:07,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,312 [root] DEBUG: Loader: Injecting process 4592 (thread 4356) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4592
2020-02-14 15:54:07,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5448
2020-02-14 15:54:07,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,405 [root] DEBUG: Loader: Injecting process 5448 (thread 5256) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5448
2020-02-14 15:54:07,453 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5448, ImageBase: 0x00400000
2020-02-14 15:54:07,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5448
2020-02-14 15:54:07,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,453 [root] DEBUG: Loader: Injecting process 5448 (thread 5256) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5448
2020-02-14 15:54:07,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4440
2020-02-14 15:54:07,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,483 [root] DEBUG: Loader: Injecting process 4440 (thread 4460) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4440
2020-02-14 15:54:07,500 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4440, ImageBase: 0x00400000
2020-02-14 15:54:07,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4440
2020-02-14 15:54:07,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,515 [root] DEBUG: Loader: Injecting process 4440 (thread 4460) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4440
2020-02-14 15:54:07,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5460
2020-02-14 15:54:07,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,530 [root] DEBUG: Loader: Injecting process 5460 (thread 5332) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5460
2020-02-14 15:54:07,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5460, ImageBase: 0x00400000
2020-02-14 15:54:07,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5460
2020-02-14 15:54:07,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,562 [root] DEBUG: Loader: Injecting process 5460 (thread 5332) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5460
2020-02-14 15:54:07,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5420
2020-02-14 15:54:07,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,812 [root] DEBUG: Loader: Injecting process 5420 (thread 5760) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:07,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5420
2020-02-14 15:54:07,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5420, ImageBase: 0x00400000
2020-02-14 15:54:07,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5420
2020-02-14 15:54:07,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:07,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:07,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:07,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:07,858 [root] DEBUG: Loader: Injecting process 5420 (thread 5760) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:07,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:07,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:07,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5420
2020-02-14 15:54:07,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5224
2020-02-14 15:54:08,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,203 [root] DEBUG: Loader: Injecting process 5224 (thread 5792) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:08,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5224
2020-02-14 15:54:08,233 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5224, ImageBase: 0x00400000
2020-02-14 15:54:08,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5224
2020-02-14 15:54:08,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,250 [root] DEBUG: Loader: Injecting process 5224 (thread 5792) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:08,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5224
2020-02-14 15:54:08,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4248
2020-02-14 15:54:08,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,265 [root] DEBUG: Loader: Injecting process 4248 (thread 4140) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:08,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4248
2020-02-14 15:54:08,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4248, ImageBase: 0x00400000
2020-02-14 15:54:08,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4248
2020-02-14 15:54:08,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,296 [root] DEBUG: Loader: Injecting process 4248 (thread 4140) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:08,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4248
2020-02-14 15:54:08,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5680
2020-02-14 15:54:08,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,328 [root] DEBUG: Loader: Injecting process 5680 (thread 5884) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:08,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5680
2020-02-14 15:54:08,358 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5680, ImageBase: 0x00400000
2020-02-14 15:54:08,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5680
2020-02-14 15:54:08,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,358 [root] DEBUG: Loader: Injecting process 5680 (thread 5884) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:08,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5680
2020-02-14 15:54:08,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6032
2020-02-14 15:54:08,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,390 [root] DEBUG: Loader: Injecting process 6032 (thread 6036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:08,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6032
2020-02-14 15:54:08,405 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6032, ImageBase: 0x00400000
2020-02-14 15:54:08,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6032
2020-02-14 15:54:08,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:08,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:08,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:08,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:08,421 [root] DEBUG: Loader: Injecting process 6032 (thread 6036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:08,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:08,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:08,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6032
2020-02-14 15:54:08,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5124
2020-02-14 15:54:09,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,030 [root] DEBUG: Loader: Injecting process 5124 (thread 4832) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,030 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:09,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5124
2020-02-14 15:54:09,046 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5124, ImageBase: 0x00400000
2020-02-14 15:54:09,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5124
2020-02-14 15:54:09,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,062 [root] DEBUG: Loader: Injecting process 5124 (thread 4832) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,062 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:09,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5124
2020-02-14 15:54:09,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4936
2020-02-14 15:54:09,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,078 [root] DEBUG: Loader: Injecting process 4936 (thread 4348) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,078 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:09,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4936
2020-02-14 15:54:09,092 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4936, ImageBase: 0x00400000
2020-02-14 15:54:09,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4936
2020-02-14 15:54:09,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,108 [root] DEBUG: Loader: Injecting process 4936 (thread 4348) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:09,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4936
2020-02-14 15:54:09,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5916
2020-02-14 15:54:09,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,125 [root] DEBUG: Loader: Injecting process 5916 (thread 4612) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:09,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5916
2020-02-14 15:54:09,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 5916, ImageBase: 0x00400000
2020-02-14 15:54:09,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 5916
2020-02-14 15:54:09,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,155 [root] DEBUG: Loader: Injecting process 5916 (thread 4612) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:09,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 5916
2020-02-14 15:54:09,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1952
2020-02-14 15:54:09,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,171 [root] DEBUG: Loader: Injecting process 1952 (thread 2612) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:09,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1952
2020-02-14 15:54:09,187 [root] DEBUG: CreateProcessHandler: Injection info set for new process 1952, ImageBase: 0x00400000
2020-02-14 15:54:09,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 1952
2020-02-14 15:54:09,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,203 [root] DEBUG: Loader: Injecting process 1952 (thread 2612) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:09,203 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1952
2020-02-14 15:54:09,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4760
2020-02-14 15:54:09,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,546 [root] DEBUG: Loader: Injecting process 4760 (thread 6104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:09,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4760
2020-02-14 15:54:09,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4760, ImageBase: 0x00400000
2020-02-14 15:54:09,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4760
2020-02-14 15:54:09,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,592 [root] DEBUG: Loader: Injecting process 4760 (thread 6104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:09,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4760
2020-02-14 15:54:09,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4928
2020-02-14 15:54:09,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,608 [root] DEBUG: Loader: Injecting process 4928 (thread 4464) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:09,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4928
2020-02-14 15:54:09,640 [root] DEBUG: CreateProcessHandler: Injection info set for new process 4928, ImageBase: 0x00400000
2020-02-14 15:54:09,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 4928
2020-02-14 15:54:09,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,640 [root] DEBUG: Loader: Injecting process 4928 (thread 4464) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:09,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 4928
2020-02-14 15:54:09,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6216
2020-02-14 15:54:09,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,687 [root] DEBUG: Loader: Injecting process 6216 (thread 6220) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:09,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6216
2020-02-14 15:54:09,703 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6216, ImageBase: 0x00400000
2020-02-14 15:54:09,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6216
2020-02-14 15:54:09,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,717 [root] DEBUG: Loader: Injecting process 6216 (thread 6220) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:09,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6216
2020-02-14 15:54:09,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6316
2020-02-14 15:54:09,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:09,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:09,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:09,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:09,983 [root] DEBUG: Loader: Injecting process 6316 (thread 6320) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:09,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:09,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6316
2020-02-14 15:54:10,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6316, ImageBase: 0x00400000
2020-02-14 15:54:10,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6316
2020-02-14 15:54:10,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,015 [root] DEBUG: Loader: Injecting process 6316 (thread 6320) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6316
2020-02-14 15:54:10,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6416
2020-02-14 15:54:10,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,046 [root] DEBUG: Loader: Injecting process 6416 (thread 6420) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6416
2020-02-14 15:54:10,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6416, ImageBase: 0x00400000
2020-02-14 15:54:10,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6416
2020-02-14 15:54:10,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,078 [root] DEBUG: Loader: Injecting process 6416 (thread 6420) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6416
2020-02-14 15:54:10,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6516
2020-02-14 15:54:10,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,092 [root] DEBUG: Loader: Injecting process 6516 (thread 6520) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6516
2020-02-14 15:54:10,108 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6516, ImageBase: 0x00400000
2020-02-14 15:54:10,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6516
2020-02-14 15:54:10,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,125 [root] DEBUG: Loader: Injecting process 6516 (thread 6520) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6516
2020-02-14 15:54:10,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6616
2020-02-14 15:54:10,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,140 [root] DEBUG: Loader: Injecting process 6616 (thread 6620) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6616
2020-02-14 15:54:10,155 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6616, ImageBase: 0x00400000
2020-02-14 15:54:10,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6616
2020-02-14 15:54:10,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,171 [root] DEBUG: Loader: Injecting process 6616 (thread 6620) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6616
2020-02-14 15:54:10,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6716
2020-02-14 15:54:10,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,250 [root] DEBUG: Loader: Injecting process 6716 (thread 6720) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6716
2020-02-14 15:54:10,265 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6716, ImageBase: 0x00400000
2020-02-14 15:54:10,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6716
2020-02-14 15:54:10,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,280 [root] DEBUG: Loader: Injecting process 6716 (thread 6720) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6716
2020-02-14 15:54:10,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6816
2020-02-14 15:54:10,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,296 [root] DEBUG: Loader: Injecting process 6816 (thread 6820) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-02-14 15:54:10,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6816, ImageBase: 0x00400000
2020-02-14 15:54:10,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6816
2020-02-14 15:54:10,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,342 [root] DEBUG: Loader: Injecting process 6816 (thread 6820) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6816
2020-02-14 15:54:10,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6916
2020-02-14 15:54:10,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,358 [root] DEBUG: Loader: Injecting process 6916 (thread 6920) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6916
2020-02-14 15:54:10,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6916, ImageBase: 0x00400000
2020-02-14 15:54:10,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6916
2020-02-14 15:54:10,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,405 [root] DEBUG: Loader: Injecting process 6916 (thread 6920) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6916
2020-02-14 15:54:10,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7016
2020-02-14 15:54:10,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,421 [root] DEBUG: Loader: Injecting process 7016 (thread 7020) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7016
2020-02-14 15:54:10,453 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7016, ImageBase: 0x00400000
2020-02-14 15:54:10,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7016
2020-02-14 15:54:10,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,467 [root] DEBUG: Loader: Injecting process 7016 (thread 7020) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7016
2020-02-14 15:54:10,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7116
2020-02-14 15:54:10,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,515 [root] DEBUG: Loader: Injecting process 7116 (thread 7120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7116
2020-02-14 15:54:10,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7116, ImageBase: 0x00400000
2020-02-14 15:54:10,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7116
2020-02-14 15:54:10,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,546 [root] DEBUG: Loader: Injecting process 7116 (thread 7120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7116
2020-02-14 15:54:10,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7216
2020-02-14 15:54:10,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,562 [root] DEBUG: Loader: Injecting process 7216 (thread 7220) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7216
2020-02-14 15:54:10,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7216, ImageBase: 0x00400000
2020-02-14 15:54:10,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7216
2020-02-14 15:54:10,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,592 [root] DEBUG: Loader: Injecting process 7216 (thread 7220) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7216
2020-02-14 15:54:10,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7316
2020-02-14 15:54:10,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,608 [root] DEBUG: Loader: Injecting process 7316 (thread 7320) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7316
2020-02-14 15:54:10,625 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7316, ImageBase: 0x00400000
2020-02-14 15:54:10,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7316
2020-02-14 15:54:10,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,640 [root] DEBUG: Loader: Injecting process 7316 (thread 7320) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7316
2020-02-14 15:54:10,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7416
2020-02-14 15:54:10,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,655 [root] DEBUG: Loader: Injecting process 7416 (thread 7420) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7416
2020-02-14 15:54:10,687 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7416, ImageBase: 0x00400000
2020-02-14 15:54:10,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7416
2020-02-14 15:54:10,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,687 [root] DEBUG: Loader: Injecting process 7416 (thread 7420) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7416
2020-02-14 15:54:10,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7516
2020-02-14 15:54:10,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,953 [root] DEBUG: Loader: Injecting process 7516 (thread 7520) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:10,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7516
2020-02-14 15:54:10,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7516, ImageBase: 0x00400000
2020-02-14 15:54:10,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7516
2020-02-14 15:54:10,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:10,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:10,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:10,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:10,983 [root] DEBUG: Loader: Injecting process 7516 (thread 7520) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:10,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:10,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:10,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7516
2020-02-14 15:54:11,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7616
2020-02-14 15:54:11,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,000 [root] DEBUG: Loader: Injecting process 7616 (thread 7620) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7616
2020-02-14 15:54:11,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7616, ImageBase: 0x00400000
2020-02-14 15:54:11,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7616
2020-02-14 15:54:11,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,030 [root] DEBUG: Loader: Injecting process 7616 (thread 7620) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7616
2020-02-14 15:54:11,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7716
2020-02-14 15:54:11,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,046 [root] DEBUG: Loader: Injecting process 7716 (thread 7720) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7716
2020-02-14 15:54:11,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7716, ImageBase: 0x00400000
2020-02-14 15:54:11,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7716
2020-02-14 15:54:11,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,092 [root] DEBUG: Loader: Injecting process 7716 (thread 7720) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7716
2020-02-14 15:54:11,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7816
2020-02-14 15:54:11,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,108 [root] DEBUG: Loader: Injecting process 7816 (thread 7820) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7816
2020-02-14 15:54:11,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7816, ImageBase: 0x00400000
2020-02-14 15:54:11,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7816
2020-02-14 15:54:11,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,140 [root] DEBUG: Loader: Injecting process 7816 (thread 7820) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7816
2020-02-14 15:54:11,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7916
2020-02-14 15:54:11,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,187 [root] DEBUG: Loader: Injecting process 7916 (thread 7920) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,203 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7916
2020-02-14 15:54:11,233 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7916, ImageBase: 0x00400000
2020-02-14 15:54:11,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7916
2020-02-14 15:54:11,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,250 [root] DEBUG: Loader: Injecting process 7916 (thread 7920) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7916
2020-02-14 15:54:11,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8016
2020-02-14 15:54:11,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,265 [root] DEBUG: Loader: Injecting process 8016 (thread 8020) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8016
2020-02-14 15:54:11,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8016, ImageBase: 0x00400000
2020-02-14 15:54:11,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8016
2020-02-14 15:54:11,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,296 [root] DEBUG: Loader: Injecting process 8016 (thread 8020) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8016
2020-02-14 15:54:11,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8116
2020-02-14 15:54:11,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,312 [root] DEBUG: Loader: Injecting process 8116 (thread 8120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8116
2020-02-14 15:54:11,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8116, ImageBase: 0x00400000
2020-02-14 15:54:11,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8116
2020-02-14 15:54:11,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,342 [root] DEBUG: Loader: Injecting process 8116 (thread 8120) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8116
2020-02-14 15:54:11,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6008
2020-02-14 15:54:11,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,358 [root] DEBUG: Loader: Injecting process 6008 (thread 4748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6008
2020-02-14 15:54:11,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6008, ImageBase: 0x00400000
2020-02-14 15:54:11,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6008
2020-02-14 15:54:11,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,390 [root] DEBUG: Loader: Injecting process 6008 (thread 4748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6008
2020-02-14 15:54:11,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6288
2020-02-14 15:54:11,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,717 [root] DEBUG: Loader: Injecting process 6288 (thread 6292) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6288
2020-02-14 15:54:11,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6288, ImageBase: 0x00400000
2020-02-14 15:54:11,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6288
2020-02-14 15:54:11,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,750 [root] DEBUG: Loader: Injecting process 6288 (thread 6292) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6288
2020-02-14 15:54:11,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6404
2020-02-14 15:54:11,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,780 [root] DEBUG: Loader: Injecting process 6404 (thread 6380) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6404
2020-02-14 15:54:11,796 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6404, ImageBase: 0x00400000
2020-02-14 15:54:11,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6404
2020-02-14 15:54:11,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,812 [root] DEBUG: Loader: Injecting process 6404 (thread 6380) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6404
2020-02-14 15:54:11,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6508
2020-02-14 15:54:11,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,828 [root] DEBUG: Loader: Injecting process 6508 (thread 6512) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6508
2020-02-14 15:54:11,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6508, ImageBase: 0x00400000
2020-02-14 15:54:11,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6508
2020-02-14 15:54:11,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,858 [root] DEBUG: Loader: Injecting process 6508 (thread 6512) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6508
2020-02-14 15:54:11,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6652
2020-02-14 15:54:11,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,875 [root] DEBUG: Loader: Injecting process 6652 (thread 6656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:11,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6652
2020-02-14 15:54:11,890 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6652, ImageBase: 0x00400000
2020-02-14 15:54:11,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6652
2020-02-14 15:54:11,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:11,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:11,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:11,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:11,905 [root] DEBUG: Loader: Injecting process 6652 (thread 6656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:11,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:11,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:11,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6652
2020-02-14 15:54:11,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6740
2020-02-14 15:54:12,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,280 [root] DEBUG: Loader: Injecting process 6740 (thread 6732) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6740
2020-02-14 15:54:12,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6740, ImageBase: 0x00400000
2020-02-14 15:54:12,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6740
2020-02-14 15:54:12,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,342 [root] DEBUG: Loader: Injecting process 6740 (thread 6732) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6740
2020-02-14 15:54:12,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6888
2020-02-14 15:54:12,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,358 [root] DEBUG: Loader: Injecting process 6888 (thread 6892) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6888
2020-02-14 15:54:12,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6888, ImageBase: 0x00400000
2020-02-14 15:54:12,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6888
2020-02-14 15:54:12,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,390 [root] DEBUG: Loader: Injecting process 6888 (thread 6892) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6888
2020-02-14 15:54:12,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7004
2020-02-14 15:54:12,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,405 [root] DEBUG: Loader: Injecting process 7004 (thread 6980) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7004
2020-02-14 15:54:12,421 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7004, ImageBase: 0x00400000
2020-02-14 15:54:12,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7004
2020-02-14 15:54:12,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,437 [root] DEBUG: Loader: Injecting process 7004 (thread 6980) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7004
2020-02-14 15:54:12,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7076
2020-02-14 15:54:12,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,453 [root] DEBUG: Loader: Injecting process 7076 (thread 7108) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7076
2020-02-14 15:54:12,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7076, ImageBase: 0x00400000
2020-02-14 15:54:12,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7076
2020-02-14 15:54:12,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,500 [root] DEBUG: Loader: Injecting process 7076 (thread 7108) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7076
2020-02-14 15:54:12,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7248
2020-02-14 15:54:12,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,546 [root] DEBUG: Loader: Injecting process 7248 (thread 7252) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7248
2020-02-14 15:54:12,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7248, ImageBase: 0x00400000
2020-02-14 15:54:12,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7248
2020-02-14 15:54:12,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,578 [root] DEBUG: Loader: Injecting process 7248 (thread 7252) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7248
2020-02-14 15:54:12,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7336
2020-02-14 15:54:12,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,608 [root] DEBUG: Loader: Injecting process 7336 (thread 7340) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7336
2020-02-14 15:54:12,640 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7336, ImageBase: 0x00400000
2020-02-14 15:54:12,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7336
2020-02-14 15:54:12,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,640 [root] DEBUG: Loader: Injecting process 7336 (thread 7340) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7336
2020-02-14 15:54:12,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7468
2020-02-14 15:54:12,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,671 [root] DEBUG: Loader: Injecting process 7468 (thread 7488) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,687 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7468
2020-02-14 15:54:12,703 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7468, ImageBase: 0x00400000
2020-02-14 15:54:12,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7468
2020-02-14 15:54:12,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,717 [root] DEBUG: Loader: Injecting process 7468 (thread 7488) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,717 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7468
2020-02-14 15:54:12,733 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7600
2020-02-14 15:54:12,733 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,733 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,733 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,733 [root] DEBUG: Loader: Injecting process 7600 (thread 7604) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,733 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7600
2020-02-14 15:54:12,765 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7600, ImageBase: 0x00400000
2020-02-14 15:54:12,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7600
2020-02-14 15:54:12,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,780 [root] DEBUG: Loader: Injecting process 7600 (thread 7604) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7600
2020-02-14 15:54:12,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7672
2020-02-14 15:54:12,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,858 [root] DEBUG: Loader: Injecting process 7672 (thread 7676) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7672
2020-02-14 15:54:12,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7672, ImageBase: 0x00400000
2020-02-14 15:54:12,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7672
2020-02-14 15:54:12,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,905 [root] DEBUG: Loader: Injecting process 7672 (thread 7676) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7672
2020-02-14 15:54:12,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7844
2020-02-14 15:54:12,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,937 [root] DEBUG: Loader: Injecting process 7844 (thread 7848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7844
2020-02-14 15:54:12,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7844, ImageBase: 0x00400000
2020-02-14 15:54:12,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7844
2020-02-14 15:54:12,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,967 [root] DEBUG: Loader: Injecting process 7844 (thread 7848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:12,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7844
2020-02-14 15:54:12,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7960
2020-02-14 15:54:12,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:12,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:12,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:12,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:12,983 [root] DEBUG: Loader: Injecting process 7960 (thread 7936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:12,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,983 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:12,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:12,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7960
2020-02-14 15:54:13,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7960, ImageBase: 0x00400000
2020-02-14 15:54:13,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7960
2020-02-14 15:54:13,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,015 [root] DEBUG: Loader: Injecting process 7960 (thread 7936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,015 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7960
2020-02-14 15:54:13,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8064
2020-02-14 15:54:13,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,217 [root] DEBUG: Loader: Injecting process 8064 (thread 8068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8064
2020-02-14 15:54:13,233 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8064, ImageBase: 0x00400000
2020-02-14 15:54:13,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8064
2020-02-14 15:54:13,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,250 [root] DEBUG: Loader: Injecting process 8064 (thread 8068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8064
2020-02-14 15:54:13,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6148
2020-02-14 15:54:13,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,265 [root] DEBUG: Loader: Injecting process 6148 (thread 6152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6148
2020-02-14 15:54:13,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6148, ImageBase: 0x00400000
2020-02-14 15:54:13,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6148
2020-02-14 15:54:13,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,312 [root] DEBUG: Loader: Injecting process 6148 (thread 6152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6148
2020-02-14 15:54:13,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6252
2020-02-14 15:54:13,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,328 [root] DEBUG: Loader: Injecting process 6252 (thread 6212) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6252
2020-02-14 15:54:13,342 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6252, ImageBase: 0x00400000
2020-02-14 15:54:13,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6252
2020-02-14 15:54:13,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,358 [root] DEBUG: Loader: Injecting process 6252 (thread 6212) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6252
2020-02-14 15:54:13,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 772
2020-02-14 15:54:13,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,375 [root] DEBUG: Loader: Injecting process 772 (thread 6400) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 772
2020-02-14 15:54:13,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 772, ImageBase: 0x00400000
2020-02-14 15:54:13,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 772
2020-02-14 15:54:13,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,405 [root] DEBUG: Loader: Injecting process 772 (thread 6400) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 772
2020-02-14 15:54:13,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6532
2020-02-14 15:54:13,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,500 [root] DEBUG: Loader: Injecting process 6532 (thread 6564) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6532
2020-02-14 15:54:13,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6532, ImageBase: 0x00400000
2020-02-14 15:54:13,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6532
2020-02-14 15:54:13,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,530 [root] DEBUG: Loader: Injecting process 6532 (thread 6564) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6532
2020-02-14 15:54:13,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6664
2020-02-14 15:54:13,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,546 [root] DEBUG: Loader: Injecting process 6664 (thread 6640) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6664
2020-02-14 15:54:13,562 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6664, ImageBase: 0x00400000
2020-02-14 15:54:13,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6664
2020-02-14 15:54:13,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,578 [root] DEBUG: Loader: Injecting process 6664 (thread 6640) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6664
2020-02-14 15:54:13,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6856
2020-02-14 15:54:13,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,592 [root] DEBUG: Loader: Injecting process 6856 (thread 6860) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6856
2020-02-14 15:54:13,608 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6856, ImageBase: 0x00400000
2020-02-14 15:54:13,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6856
2020-02-14 15:54:13,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,625 [root] DEBUG: Loader: Injecting process 6856 (thread 6860) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6856
2020-02-14 15:54:13,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6992
2020-02-14 15:54:13,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,640 [root] DEBUG: Loader: Injecting process 6992 (thread 6936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6992
2020-02-14 15:54:13,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6992, ImageBase: 0x00400000
2020-02-14 15:54:13,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6992
2020-02-14 15:54:13,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,671 [root] DEBUG: Loader: Injecting process 6992 (thread 6936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6992
2020-02-14 15:54:13,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7064
2020-02-14 15:54:13,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,750 [root] DEBUG: Loader: Injecting process 7064 (thread 7084) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7064
2020-02-14 15:54:13,780 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7064, ImageBase: 0x00400000
2020-02-14 15:54:13,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7064
2020-02-14 15:54:13,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,796 [root] DEBUG: Loader: Injecting process 7064 (thread 7084) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7064
2020-02-14 15:54:13,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7268
2020-02-14 15:54:13,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,812 [root] DEBUG: Loader: Injecting process 7268 (thread 7288) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7268
2020-02-14 15:54:13,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7268, ImageBase: 0x00400000
2020-02-14 15:54:13,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7268
2020-02-14 15:54:13,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,842 [root] DEBUG: Loader: Injecting process 7268 (thread 7288) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7268
2020-02-14 15:54:13,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7388
2020-02-14 15:54:13,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,875 [root] DEBUG: Loader: Injecting process 7388 (thread 7392) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7388
2020-02-14 15:54:13,905 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7388, ImageBase: 0x00400000
2020-02-14 15:54:13,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7388
2020-02-14 15:54:13,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,905 [root] DEBUG: Loader: Injecting process 7388 (thread 7392) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7388
2020-02-14 15:54:13,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7548
2020-02-14 15:54:13,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,937 [root] DEBUG: Loader: Injecting process 7548 (thread 7540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:13,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7548
2020-02-14 15:54:13,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7548, ImageBase: 0x00400000
2020-02-14 15:54:13,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7548
2020-02-14 15:54:13,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:13,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:13,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:13,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:13,967 [root] DEBUG: Loader: Injecting process 7548 (thread 7540) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:13,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:13,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:13,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7548
2020-02-14 15:54:13,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7700
2020-02-14 15:54:14,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,358 [root] DEBUG: Loader: Injecting process 7700 (thread 7704) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:14,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7700
2020-02-14 15:54:14,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7700, ImageBase: 0x00400000
2020-02-14 15:54:14,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7700
2020-02-14 15:54:14,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,390 [root] DEBUG: Loader: Injecting process 7700 (thread 7704) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:14,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7700
2020-02-14 15:54:14,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7788
2020-02-14 15:54:14,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,421 [root] DEBUG: Loader: Injecting process 7788 (thread 7792) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:14,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-02-14 15:54:14,453 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7788, ImageBase: 0x00400000
2020-02-14 15:54:14,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7788
2020-02-14 15:54:14,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,453 [root] DEBUG: Loader: Injecting process 7788 (thread 7792) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:14,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7788
2020-02-14 15:54:14,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7992
2020-02-14 15:54:14,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,483 [root] DEBUG: Loader: Injecting process 7992 (thread 7996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:14,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-02-14 15:54:14,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7992, ImageBase: 0x00400000
2020-02-14 15:54:14,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7992
2020-02-14 15:54:14,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,530 [root] DEBUG: Loader: Injecting process 7992 (thread 7996) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:14,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7992
2020-02-14 15:54:14,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8108
2020-02-14 15:54:14,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,905 [root] DEBUG: Loader: Injecting process 8108 (thread 8100) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:14,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8108
2020-02-14 15:54:14,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8108, ImageBase: 0x00400000
2020-02-14 15:54:14,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8108
2020-02-14 15:54:14,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,937 [root] DEBUG: Loader: Injecting process 8108 (thread 8100) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:14,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8108
2020-02-14 15:54:14,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6184
2020-02-14 15:54:14,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,953 [root] DEBUG: Loader: Injecting process 6184 (thread 6172) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:14,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6184
2020-02-14 15:54:14,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6184, ImageBase: 0x00400000
2020-02-14 15:54:14,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6184
2020-02-14 15:54:14,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:14,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:14,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:14,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:14,983 [root] DEBUG: Loader: Injecting process 6184 (thread 6172) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:14,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:14,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:14,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6184
2020-02-14 15:54:15,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6388
2020-02-14 15:54:15,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,375 [root] DEBUG: Loader: Injecting process 6388 (thread 6392) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:15,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6388
2020-02-14 15:54:15,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6388, ImageBase: 0x00400000
2020-02-14 15:54:15,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6388
2020-02-14 15:54:15,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,405 [root] DEBUG: Loader: Injecting process 6388 (thread 6392) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:15,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6388
2020-02-14 15:54:15,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6476
2020-02-14 15:54:15,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,421 [root] DEBUG: Loader: Injecting process 6476 (thread 6484) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:15,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6476
2020-02-14 15:54:15,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6476, ImageBase: 0x00400000
2020-02-14 15:54:15,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6476
2020-02-14 15:54:15,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,453 [root] DEBUG: Loader: Injecting process 6476 (thread 6484) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:15,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6476
2020-02-14 15:54:15,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6596
2020-02-14 15:54:15,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,530 [root] DEBUG: Loader: Injecting process 6596 (thread 6700) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:15,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6596
2020-02-14 15:54:15,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6596, ImageBase: 0x00400000
2020-02-14 15:54:15,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6596
2020-02-14 15:54:15,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,562 [root] DEBUG: Loader: Injecting process 6596 (thread 6700) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:15,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6596
2020-02-14 15:54:15,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6844
2020-02-14 15:54:15,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,578 [root] DEBUG: Loader: Injecting process 6844 (thread 6864) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:15,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6844
2020-02-14 15:54:15,592 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6844, ImageBase: 0x00400000
2020-02-14 15:54:15,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6844
2020-02-14 15:54:15,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,608 [root] DEBUG: Loader: Injecting process 6844 (thread 6864) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:15,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6844
2020-02-14 15:54:15,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6996
2020-02-14 15:54:15,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,671 [root] DEBUG: Loader: Injecting process 6996 (thread 7000) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:15,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6996
2020-02-14 15:54:15,687 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6996, ImageBase: 0x00400000
2020-02-14 15:54:15,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6996
2020-02-14 15:54:15,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,687 [root] DEBUG: Loader: Injecting process 6996 (thread 7000) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:15,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6996
2020-02-14 15:54:15,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7180
2020-02-14 15:54:15,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,703 [root] DEBUG: Loader: Injecting process 7180 (thread 7200) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:15,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7180
2020-02-14 15:54:15,717 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7180, ImageBase: 0x00400000
2020-02-14 15:54:15,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7180
2020-02-14 15:54:15,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,733 [root] DEBUG: Loader: Injecting process 7180 (thread 7200) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:15,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7180
2020-02-14 15:54:15,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7400
2020-02-14 15:54:15,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,967 [root] DEBUG: Loader: Injecting process 7400 (thread 7404) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:15,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7400
2020-02-14 15:54:15,983 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7400, ImageBase: 0x00400000
2020-02-14 15:54:15,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7400
2020-02-14 15:54:15,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:15,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:15,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:15,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:15,983 [root] DEBUG: Loader: Injecting process 7400 (thread 7404) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:15,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:15,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:15,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7400
2020-02-14 15:54:16,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7432
2020-02-14 15:54:16,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,015 [root] DEBUG: Loader: Injecting process 7432 (thread 7464) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,015 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,015 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:16,015 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-02-14 15:54:16,030 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7432, ImageBase: 0x00400000
2020-02-14 15:54:16,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7432
2020-02-14 15:54:16,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,046 [root] DEBUG: Loader: Injecting process 7432 (thread 7464) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:16,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7432
2020-02-14 15:54:16,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7696
2020-02-14 15:54:16,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,062 [root] DEBUG: Loader: Injecting process 7696 (thread 7684) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:16,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7696
2020-02-14 15:54:16,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7696, ImageBase: 0x00400000
2020-02-14 15:54:16,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7696
2020-02-14 15:54:16,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,092 [root] DEBUG: Loader: Injecting process 7696 (thread 7684) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:16,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7696
2020-02-14 15:54:16,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7840
2020-02-14 15:54:16,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,108 [root] DEBUG: Loader: Injecting process 7840 (thread 7860) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:16,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7840
2020-02-14 15:54:16,125 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7840, ImageBase: 0x00400000
2020-02-14 15:54:16,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7840
2020-02-14 15:54:16,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,140 [root] DEBUG: Loader: Injecting process 7840 (thread 7860) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:16,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7840
2020-02-14 15:54:16,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7980
2020-02-14 15:54:16,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,500 [root] DEBUG: Loader: Injecting process 7980 (thread 8056) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:16,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7980
2020-02-14 15:54:16,530 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7980, ImageBase: 0x00400000
2020-02-14 15:54:16,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7980
2020-02-14 15:54:16,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,546 [root] DEBUG: Loader: Injecting process 7980 (thread 8056) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:16,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7980
2020-02-14 15:54:16,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6204
2020-02-14 15:54:16,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,562 [root] DEBUG: Loader: Injecting process 6204 (thread 6180) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,562 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:16,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6204
2020-02-14 15:54:16,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6204, ImageBase: 0x00400000
2020-02-14 15:54:16,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6204
2020-02-14 15:54:16,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,592 [root] DEBUG: Loader: Injecting process 6204 (thread 6180) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,592 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:16,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6204
2020-02-14 15:54:16,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6284
2020-02-14 15:54:16,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,608 [root] DEBUG: Loader: Injecting process 6284 (thread 6312) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:16,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6284
2020-02-14 15:54:16,625 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6284, ImageBase: 0x00400000
2020-02-14 15:54:16,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6284
2020-02-14 15:54:16,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,640 [root] DEBUG: Loader: Injecting process 6284 (thread 6312) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:16,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6284
2020-02-14 15:54:16,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6472
2020-02-14 15:54:16,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,655 [root] DEBUG: Loader: Injecting process 6472 (thread 6592) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:16,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6472
2020-02-14 15:54:16,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6472, ImageBase: 0x00400000
2020-02-14 15:54:16,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6472
2020-02-14 15:54:16,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:16,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:16,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:16,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:16,687 [root] DEBUG: Loader: Injecting process 6472 (thread 6592) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:16,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:16,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:16,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6472
2020-02-14 15:54:16,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6712
2020-02-14 15:54:17,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,265 [root] DEBUG: Loader: Injecting process 6712 (thread 6672) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:17,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6712
2020-02-14 15:54:17,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6712, ImageBase: 0x00400000
2020-02-14 15:54:17,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6712
2020-02-14 15:54:17,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,280 [root] DEBUG: Loader: Injecting process 6712 (thread 6672) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:17,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6712
2020-02-14 15:54:17,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6848
2020-02-14 15:54:17,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,312 [root] DEBUG: Loader: Injecting process 6848 (thread 6932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:17,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6848
2020-02-14 15:54:17,342 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6848, ImageBase: 0x00400000
2020-02-14 15:54:17,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6848
2020-02-14 15:54:17,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,342 [root] DEBUG: Loader: Injecting process 6848 (thread 6932) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:17,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6848
2020-02-14 15:54:17,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7148
2020-02-14 15:54:17,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,358 [root] DEBUG: Loader: Injecting process 7148 (thread 7168) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:17,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7148
2020-02-14 15:54:17,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7148, ImageBase: 0x00400000
2020-02-14 15:54:17,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7148
2020-02-14 15:54:17,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,375 [root] DEBUG: Loader: Injecting process 7148 (thread 7168) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:17,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7148
2020-02-14 15:54:17,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7344
2020-02-14 15:54:17,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,405 [root] DEBUG: Loader: Injecting process 7344 (thread 7232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:17,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7344
2020-02-14 15:54:17,421 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7344, ImageBase: 0x00400000
2020-02-14 15:54:17,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7344
2020-02-14 15:54:17,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:17,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:17,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:17,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:17,437 [root] DEBUG: Loader: Injecting process 7344 (thread 7232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:17,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:17,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:17,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7344
2020-02-14 15:54:17,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7484
2020-02-14 15:54:19,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,265 [root] DEBUG: Loader: Injecting process 7484 (thread 7472) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7484
2020-02-14 15:54:19,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7484, ImageBase: 0x00400000
2020-02-14 15:54:19,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7484
2020-02-14 15:54:19,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,280 [root] DEBUG: Loader: Injecting process 7484 (thread 7472) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7484
2020-02-14 15:54:19,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7732
2020-02-14 15:54:19,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,312 [root] DEBUG: Loader: Injecting process 7732 (thread 7748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7732
2020-02-14 15:54:19,342 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7732, ImageBase: 0x00400000
2020-02-14 15:54:19,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7732
2020-02-14 15:54:19,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,342 [root] DEBUG: Loader: Injecting process 7732 (thread 7748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7732
2020-02-14 15:54:19,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7900
2020-02-14 15:54:19,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,358 [root] DEBUG: Loader: Injecting process 7900 (thread 7832) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7900
2020-02-14 15:54:19,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7900, ImageBase: 0x00400000
2020-02-14 15:54:19,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7900
2020-02-14 15:54:19,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,390 [root] DEBUG: Loader: Injecting process 7900 (thread 7832) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7900
2020-02-14 15:54:19,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8156
2020-02-14 15:54:19,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,483 [root] DEBUG: Loader: Injecting process 8156 (thread 8136) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8156
2020-02-14 15:54:19,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8156, ImageBase: 0x00400000
2020-02-14 15:54:19,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8156
2020-02-14 15:54:19,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,515 [root] DEBUG: Loader: Injecting process 8156 (thread 8136) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8156
2020-02-14 15:54:19,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2604
2020-02-14 15:54:19,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,530 [root] DEBUG: Loader: Injecting process 2604 (thread 6260) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2604
2020-02-14 15:54:19,562 [root] DEBUG: CreateProcessHandler: Injection info set for new process 2604, ImageBase: 0x00400000
2020-02-14 15:54:19,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 2604
2020-02-14 15:54:19,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,578 [root] DEBUG: Loader: Injecting process 2604 (thread 6260) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2604
2020-02-14 15:54:19,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6456
2020-02-14 15:54:19,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,592 [root] DEBUG: Loader: Injecting process 6456 (thread 6432) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,592 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6456
2020-02-14 15:54:19,608 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6456, ImageBase: 0x00400000
2020-02-14 15:54:19,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6456
2020-02-14 15:54:19,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,625 [root] DEBUG: Loader: Injecting process 6456 (thread 6432) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,625 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6456
2020-02-14 15:54:19,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6780
2020-02-14 15:54:19,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,640 [root] DEBUG: Loader: Injecting process 6780 (thread 6736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,640 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,640 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,640 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6780
2020-02-14 15:54:19,655 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6780, ImageBase: 0x00400000
2020-02-14 15:54:19,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6780
2020-02-14 15:54:19,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,671 [root] DEBUG: Loader: Injecting process 6780 (thread 6736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6780
2020-02-14 15:54:19,687 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7044
2020-02-14 15:54:19,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,703 [root] DEBUG: Loader: Injecting process 7044 (thread 7048) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7044
2020-02-14 15:54:19,717 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7044, ImageBase: 0x00400000
2020-02-14 15:54:19,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7044
2020-02-14 15:54:19,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,733 [root] DEBUG: Loader: Injecting process 7044 (thread 7048) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7044
2020-02-14 15:54:19,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7244
2020-02-14 15:54:19,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,750 [root] DEBUG: Loader: Injecting process 7244 (thread 7300) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,750 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,750 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7244
2020-02-14 15:54:19,765 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7244, ImageBase: 0x00400000
2020-02-14 15:54:19,765 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7244
2020-02-14 15:54:19,765 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,765 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,780 [root] DEBUG: Loader: Injecting process 7244 (thread 7300) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,780 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7244
2020-02-14 15:54:19,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7408
2020-02-14 15:54:19,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,796 [root] DEBUG: Loader: Injecting process 7408 (thread 7412) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,796 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7408
2020-02-14 15:54:19,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7408, ImageBase: 0x00400000
2020-02-14 15:54:19,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7408
2020-02-14 15:54:19,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,828 [root] DEBUG: Loader: Injecting process 7408 (thread 7412) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7408
2020-02-14 15:54:19,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7572
2020-02-14 15:54:19,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,842 [root] DEBUG: Loader: Injecting process 7572 (thread 7656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7572
2020-02-14 15:54:19,858 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7572, ImageBase: 0x00400000
2020-02-14 15:54:19,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7572
2020-02-14 15:54:19,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,875 [root] DEBUG: Loader: Injecting process 7572 (thread 7656) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,875 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7572
2020-02-14 15:54:19,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7896
2020-02-14 15:54:19,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,905 [root] DEBUG: Loader: Injecting process 7896 (thread 8048) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7896
2020-02-14 15:54:19,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7896, ImageBase: 0x00400000
2020-02-14 15:54:19,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7896
2020-02-14 15:54:19,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,937 [root] DEBUG: Loader: Injecting process 7896 (thread 8048) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7896
2020-02-14 15:54:19,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6200
2020-02-14 15:54:19,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,953 [root] DEBUG: Loader: Injecting process 6200 (thread 8176) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:19,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6200
2020-02-14 15:54:19,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6200, ImageBase: 0x00400000
2020-02-14 15:54:19,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6200
2020-02-14 15:54:19,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:19,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:19,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:19,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:19,983 [root] DEBUG: Loader: Injecting process 6200 (thread 8176) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:19,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:19,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:19,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6200
2020-02-14 15:54:20,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6240
2020-02-14 15:54:20,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,140 [root] DEBUG: Loader: Injecting process 6240 (thread 6352) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,140 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6240
2020-02-14 15:54:20,155 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6240, ImageBase: 0x00400000
2020-02-14 15:54:20,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6240
2020-02-14 15:54:20,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,171 [root] DEBUG: Loader: Injecting process 6240 (thread 6352) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6240
2020-02-14 15:54:20,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6648
2020-02-14 15:54:20,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,187 [root] DEBUG: Loader: Injecting process 6648 (thread 6696) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6648
2020-02-14 15:54:20,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6648, ImageBase: 0x00400000
2020-02-14 15:54:20,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6648
2020-02-14 15:54:20,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,217 [root] DEBUG: Loader: Injecting process 6648 (thread 6696) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6648
2020-02-14 15:54:20,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6772
2020-02-14 15:54:20,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,233 [root] DEBUG: Loader: Injecting process 6772 (thread 6792) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6772
2020-02-14 15:54:20,250 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6772, ImageBase: 0x00400000
2020-02-14 15:54:20,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6772
2020-02-14 15:54:20,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,265 [root] DEBUG: Loader: Injecting process 6772 (thread 6792) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6772
2020-02-14 15:54:20,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7164
2020-02-14 15:54:20,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,280 [root] DEBUG: Loader: Injecting process 7164 (thread 7172) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7164
2020-02-14 15:54:20,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7164, ImageBase: 0x00400000
2020-02-14 15:54:20,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7164
2020-02-14 15:54:20,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,312 [root] DEBUG: Loader: Injecting process 7164 (thread 7172) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7164
2020-02-14 15:54:20,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7536
2020-02-14 15:54:20,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,328 [root] DEBUG: Loader: Injecting process 7536 (thread 7552) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,342 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7536
2020-02-14 15:54:20,358 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7536, ImageBase: 0x00400000
2020-02-14 15:54:20,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7536
2020-02-14 15:54:20,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,358 [root] DEBUG: Loader: Injecting process 7536 (thread 7552) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7536
2020-02-14 15:54:20,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7752
2020-02-14 15:54:20,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,390 [root] DEBUG: Loader: Injecting process 7752 (thread 7640) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7752
2020-02-14 15:54:20,405 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7752, ImageBase: 0x00400000
2020-02-14 15:54:20,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7752
2020-02-14 15:54:20,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,421 [root] DEBUG: Loader: Injecting process 7752 (thread 7640) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7752
2020-02-14 15:54:20,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7988
2020-02-14 15:54:20,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,437 [root] DEBUG: Loader: Injecting process 7988 (thread 8084) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7988
2020-02-14 15:54:20,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7988, ImageBase: 0x00400000
2020-02-14 15:54:20,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7988
2020-02-14 15:54:20,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,467 [root] DEBUG: Loader: Injecting process 7988 (thread 8084) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7988
2020-02-14 15:54:20,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6368
2020-02-14 15:54:20,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,500 [root] DEBUG: Loader: Injecting process 6368 (thread 6276) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6368
2020-02-14 15:54:20,530 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6368, ImageBase: 0x00400000
2020-02-14 15:54:20,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6368
2020-02-14 15:54:20,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,546 [root] DEBUG: Loader: Injecting process 6368 (thread 6276) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6368
2020-02-14 15:54:20,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6608
2020-02-14 15:54:20,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,717 [root] DEBUG: Loader: Injecting process 6608 (thread 6560) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,717 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6608
2020-02-14 15:54:20,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6608, ImageBase: 0x00400000
2020-02-14 15:54:20,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6608
2020-02-14 15:54:20,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,750 [root] DEBUG: Loader: Injecting process 6608 (thread 6560) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6608
2020-02-14 15:54:20,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6976
2020-02-14 15:54:20,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,780 [root] DEBUG: Loader: Injecting process 6976 (thread 7068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6976
2020-02-14 15:54:20,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6976, ImageBase: 0x00400000
2020-02-14 15:54:20,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6976
2020-02-14 15:54:20,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,812 [root] DEBUG: Loader: Injecting process 6976 (thread 7068) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,828 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6976
2020-02-14 15:54:20,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7352
2020-02-14 15:54:20,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,842 [root] DEBUG: Loader: Injecting process 7352 (thread 7356) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,858 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7352
2020-02-14 15:54:20,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7352, ImageBase: 0x00400000
2020-02-14 15:54:20,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7352
2020-02-14 15:54:20,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,890 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,890 [root] DEBUG: Loader: Injecting process 7352 (thread 7356) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,890 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,890 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7352
2020-02-14 15:54:20,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7596
2020-02-14 15:54:20,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,905 [root] DEBUG: Loader: Injecting process 7596 (thread 7648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7596
2020-02-14 15:54:20,937 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7596, ImageBase: 0x00400000
2020-02-14 15:54:20,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7596
2020-02-14 15:54:20,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,937 [root] DEBUG: Loader: Injecting process 7596 (thread 7648) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:20,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7596
2020-02-14 15:54:20,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7984
2020-02-14 15:54:20,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:20,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:20,967 [root] DEBUG: Loader: Injecting process 7984 (thread 7956) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:20,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,967 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:20,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:20,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7984
2020-02-14 15:54:20,983 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7984, ImageBase: 0x00400000
2020-02-14 15:54:20,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7984
2020-02-14 15:54:20,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:20,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:20,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,000 [root] DEBUG: Loader: Injecting process 7984 (thread 7956) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,000 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7984
2020-02-14 15:54:21,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6308
2020-02-14 15:54:21,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,187 [root] DEBUG: Loader: Injecting process 6308 (thread 6272) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6308
2020-02-14 15:54:21,217 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6308, ImageBase: 0x00400000
2020-02-14 15:54:21,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6308
2020-02-14 15:54:21,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,217 [root] DEBUG: Loader: Injecting process 6308 (thread 6272) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6308
2020-02-14 15:54:21,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6788
2020-02-14 15:54:21,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,250 [root] DEBUG: Loader: Injecting process 6788 (thread 6684) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6788
2020-02-14 15:54:21,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6788, ImageBase: 0x00400000
2020-02-14 15:54:21,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6788
2020-02-14 15:54:21,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,296 [root] DEBUG: Loader: Injecting process 6788 (thread 6684) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6788
2020-02-14 15:54:21,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7088
2020-02-14 15:54:21,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,312 [root] DEBUG: Loader: Injecting process 7088 (thread 7100) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7088
2020-02-14 15:54:21,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7088, ImageBase: 0x00400000
2020-02-14 15:54:21,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7088
2020-02-14 15:54:21,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,342 [root] DEBUG: Loader: Injecting process 7088 (thread 7100) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7088
2020-02-14 15:54:21,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7380
2020-02-14 15:54:21,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,358 [root] DEBUG: Loader: Injecting process 7380 (thread 7272) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7380
2020-02-14 15:54:21,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7380, ImageBase: 0x00400000
2020-02-14 15:54:21,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7380
2020-02-14 15:54:21,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,390 [root] DEBUG: Loader: Injecting process 7380 (thread 7272) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7380
2020-02-14 15:54:21,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7836
2020-02-14 15:54:21,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,421 [root] DEBUG: Loader: Injecting process 7836 (thread 7772) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7836
2020-02-14 15:54:21,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7836, ImageBase: 0x00400000
2020-02-14 15:54:21,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7836
2020-02-14 15:54:21,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,437 [root] DEBUG: Loader: Injecting process 7836 (thread 7772) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7836
2020-02-14 15:54:21,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6232
2020-02-14 15:54:21,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,467 [root] DEBUG: Loader: Injecting process 6232 (thread 7976) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6232
2020-02-14 15:54:21,500 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6232, ImageBase: 0x00400000
2020-02-14 15:54:21,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6232
2020-02-14 15:54:21,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,500 [root] DEBUG: Loader: Injecting process 6232 (thread 7976) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6232
2020-02-14 15:54:21,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6668
2020-02-14 15:54:21,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,515 [root] DEBUG: Loader: Injecting process 6668 (thread 6748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6668
2020-02-14 15:54:21,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6668, ImageBase: 0x00400000
2020-02-14 15:54:21,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6668
2020-02-14 15:54:21,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,546 [root] DEBUG: Loader: Injecting process 6668 (thread 6748) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6668
2020-02-14 15:54:21,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7240
2020-02-14 15:54:21,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,937 [root] DEBUG: Loader: Injecting process 7240 (thread 7104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:21,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7240
2020-02-14 15:54:21,953 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7240, ImageBase: 0x00400000
2020-02-14 15:54:21,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7240
2020-02-14 15:54:21,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,967 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,967 [root] DEBUG: Loader: Injecting process 7240 (thread 7104) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,967 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:21,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7240
2020-02-14 15:54:21,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7608
2020-02-14 15:54:21,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:21,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:21,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:21,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:21,983 [root] DEBUG: Loader: Injecting process 7608 (thread 7652) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:21,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:21,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7608
2020-02-14 15:54:22,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7608, ImageBase: 0x00400000
2020-02-14 15:54:22,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7608
2020-02-14 15:54:22,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,015 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,015 [root] DEBUG: Loader: Injecting process 7608 (thread 7652) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,015 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7608
2020-02-14 15:54:22,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8148
2020-02-14 15:54:22,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,046 [root] DEBUG: Loader: Injecting process 8148 (thread 8152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8148
2020-02-14 15:54:22,078 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8148, ImageBase: 0x00400000
2020-02-14 15:54:22,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8148
2020-02-14 15:54:22,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,078 [root] DEBUG: Loader: Injecting process 8148 (thread 8152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8148
2020-02-14 15:54:22,108 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6408
2020-02-14 15:54:22,108 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,108 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,108 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,108 [root] DEBUG: Loader: Injecting process 6408 (thread 6688) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,108 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6408
2020-02-14 15:54:22,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6408, ImageBase: 0x00400000
2020-02-14 15:54:22,140 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6408
2020-02-14 15:54:22,140 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,140 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,140 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,140 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,140 [root] DEBUG: Loader: Injecting process 6408 (thread 6688) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,140 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,140 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,140 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6408
2020-02-14 15:54:22,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7348
2020-02-14 15:54:22,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,608 [root] DEBUG: Loader: Injecting process 7348 (thread 7176) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,608 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7348
2020-02-14 15:54:22,625 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7348, ImageBase: 0x00400000
2020-02-14 15:54:22,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7348
2020-02-14 15:54:22,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,625 [root] DEBUG: Loader: Injecting process 7348 (thread 7176) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,640 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7348
2020-02-14 15:54:22,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7784
2020-02-14 15:54:22,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,655 [root] DEBUG: Loader: Injecting process 7784 (thread 7636) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7784
2020-02-14 15:54:22,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7784, ImageBase: 0x00400000
2020-02-14 15:54:22,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7784
2020-02-14 15:54:22,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,687 [root] DEBUG: Loader: Injecting process 7784 (thread 7636) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7784
2020-02-14 15:54:22,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7972
2020-02-14 15:54:22,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,812 [root] DEBUG: Loader: Injecting process 7972 (thread 7880) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7972
2020-02-14 15:54:22,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7972, ImageBase: 0x00400000
2020-02-14 15:54:22,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7972
2020-02-14 15:54:22,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,842 [root] DEBUG: Loader: Injecting process 7972 (thread 7880) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,842 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7972
2020-02-14 15:54:22,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7184
2020-02-14 15:54:22,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,875 [root] DEBUG: Loader: Injecting process 7184 (thread 7152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-02-14 15:54:22,905 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7184, ImageBase: 0x00400000
2020-02-14 15:54:22,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7184
2020-02-14 15:54:22,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,905 [root] DEBUG: Loader: Injecting process 7184 (thread 7152) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7184
2020-02-14 15:54:22,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7568
2020-02-14 15:54:22,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,921 [root] DEBUG: Loader: Injecting process 7568 (thread 7456) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:22,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7568
2020-02-14 15:54:22,953 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7568, ImageBase: 0x00400000
2020-02-14 15:54:22,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7568
2020-02-14 15:54:22,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,953 [root] DEBUG: Loader: Injecting process 7568 (thread 7456) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,967 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,967 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:22,967 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,967 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7568
2020-02-14 15:54:22,983 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8036
2020-02-14 15:54:22,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:22,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:22,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:22,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:22,983 [root] DEBUG: Loader: Injecting process 8036 (thread 6280) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:22,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:22,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8036
2020-02-14 15:54:23,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8036, ImageBase: 0x00400000
2020-02-14 15:54:23,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8036
2020-02-14 15:54:23,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,030 [root] DEBUG: Loader: Injecting process 8036 (thread 6280) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8036
2020-02-14 15:54:23,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7012
2020-02-14 15:54:23,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,155 [root] DEBUG: Loader: Injecting process 7012 (thread 7096) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,171 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7012
2020-02-14 15:54:23,187 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7012, ImageBase: 0x00400000
2020-02-14 15:54:23,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7012
2020-02-14 15:54:23,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,187 [root] DEBUG: Loader: Injecting process 7012 (thread 7096) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,187 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7012
2020-02-14 15:54:23,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7776
2020-02-14 15:54:23,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,375 [root] DEBUG: Loader: Injecting process 7776 (thread 8012) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7776
2020-02-14 15:54:23,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7776, ImageBase: 0x00400000
2020-02-14 15:54:23,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7776
2020-02-14 15:54:23,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,405 [root] DEBUG: Loader: Injecting process 7776 (thread 8012) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7776
2020-02-14 15:54:23,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7360
2020-02-14 15:54:23,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,437 [root] DEBUG: Loader: Injecting process 7360 (thread 6952) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,437 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7360
2020-02-14 15:54:23,453 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7360, ImageBase: 0x00400000
2020-02-14 15:54:23,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7360
2020-02-14 15:54:23,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,467 [root] DEBUG: Loader: Injecting process 7360 (thread 6952) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,467 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7360
2020-02-14 15:54:23,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8132
2020-02-14 15:54:23,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,483 [root] DEBUG: Loader: Injecting process 8132 (thread 6784) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8132
2020-02-14 15:54:23,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8132, ImageBase: 0x00400000
2020-02-14 15:54:23,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8132
2020-02-14 15:54:23,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,515 [root] DEBUG: Loader: Injecting process 8132 (thread 6784) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8132
2020-02-14 15:54:23,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6480
2020-02-14 15:54:23,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,717 [root] DEBUG: Loader: Injecting process 6480 (thread 6692) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6480
2020-02-14 15:54:23,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6480, ImageBase: 0x00400000
2020-02-14 15:54:23,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6480
2020-02-14 15:54:23,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,750 [root] DEBUG: Loader: Injecting process 6480 (thread 6692) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6480
2020-02-14 15:54:23,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7872
2020-02-14 15:54:23,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,905 [root] DEBUG: Loader: Injecting process 7872 (thread 8040) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,905 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7872
2020-02-14 15:54:23,921 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7872, ImageBase: 0x00400000
2020-02-14 15:54:23,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7872
2020-02-14 15:54:23,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,937 [root] DEBUG: Loader: Injecting process 7872 (thread 8040) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,937 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,937 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7872
2020-02-14 15:54:23,953 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6588
2020-02-14 15:54:23,953 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,953 [root] DEBUG: Loader: Injecting process 6588 (thread 6876) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,953 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:23,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6588
2020-02-14 15:54:23,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6588, ImageBase: 0x00400000
2020-02-14 15:54:23,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6588
2020-02-14 15:54:23,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:23,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:23,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:23,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:23,983 [root] DEBUG: Loader: Injecting process 6588 (thread 6876) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:23,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:23,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:23,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6588
2020-02-14 15:54:24,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7612
2020-02-14 15:54:24,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,000 [root] DEBUG: Loader: Injecting process 7612 (thread 7032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7612
2020-02-14 15:54:24,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7612, ImageBase: 0x00400000
2020-02-14 15:54:24,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7612
2020-02-14 15:54:24,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,030 [root] DEBUG: Loader: Injecting process 7612 (thread 7032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7612
2020-02-14 15:54:24,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7444
2020-02-14 15:54:24,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,046 [root] DEBUG: Loader: Injecting process 7444 (thread 6576) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7444
2020-02-14 15:54:24,062 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7444, ImageBase: 0x00400000
2020-02-14 15:54:24,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7444
2020-02-14 15:54:24,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,078 [root] DEBUG: Loader: Injecting process 7444 (thread 6576) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7444
2020-02-14 15:54:24,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6804
2020-02-14 15:54:24,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,217 [root] DEBUG: Loader: Injecting process 6804 (thread 7512) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,217 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6804
2020-02-14 15:54:24,233 [root] DEBUG: CreateProcessHandler: Injection info set for new process 6804, ImageBase: 0x00400000
2020-02-14 15:54:24,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 6804
2020-02-14 15:54:24,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,250 [root] DEBUG: Loader: Injecting process 6804 (thread 7512) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 6804
2020-02-14 15:54:24,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8220
2020-02-14 15:54:24,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,265 [root] DEBUG: Loader: Injecting process 8220 (thread 8224) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,265 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8220
2020-02-14 15:54:24,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8220, ImageBase: 0x00400000
2020-02-14 15:54:24,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8220
2020-02-14 15:54:24,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,296 [root] DEBUG: Loader: Injecting process 8220 (thread 8224) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8220
2020-02-14 15:54:24,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8320
2020-02-14 15:54:24,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,312 [root] DEBUG: Loader: Injecting process 8320 (thread 8324) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8320
2020-02-14 15:54:24,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8320, ImageBase: 0x00400000
2020-02-14 15:54:24,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8320
2020-02-14 15:54:24,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,342 [root] DEBUG: Loader: Injecting process 8320 (thread 8324) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8320
2020-02-14 15:54:24,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8420
2020-02-14 15:54:24,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,358 [root] DEBUG: Loader: Injecting process 8420 (thread 8424) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8420
2020-02-14 15:54:24,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8420, ImageBase: 0x00400000
2020-02-14 15:54:24,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8420
2020-02-14 15:54:24,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,390 [root] DEBUG: Loader: Injecting process 8420 (thread 8424) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8420
2020-02-14 15:54:24,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8520
2020-02-14 15:54:24,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,483 [root] DEBUG: Loader: Injecting process 8520 (thread 8524) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,483 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8520
2020-02-14 15:54:24,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8520, ImageBase: 0x00400000
2020-02-14 15:54:24,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8520
2020-02-14 15:54:24,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,515 [root] DEBUG: Loader: Injecting process 8520 (thread 8524) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,515 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8520
2020-02-14 15:54:24,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8620
2020-02-14 15:54:24,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,530 [root] DEBUG: Loader: Injecting process 8620 (thread 8624) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8620
2020-02-14 15:54:24,562 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8620, ImageBase: 0x00400000
2020-02-14 15:54:24,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8620
2020-02-14 15:54:24,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,578 [root] DEBUG: Loader: Injecting process 8620 (thread 8624) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8620
2020-02-14 15:54:24,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8720
2020-02-14 15:54:24,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,592 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,592 [root] DEBUG: Loader: Injecting process 8720 (thread 8724) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,592 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,592 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,592 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8720
2020-02-14 15:54:24,640 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8720, ImageBase: 0x00400000
2020-02-14 15:54:24,640 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8720
2020-02-14 15:54:24,640 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,640 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,640 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,640 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,655 [root] DEBUG: Loader: Injecting process 8720 (thread 8724) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,655 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8720
2020-02-14 15:54:24,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8820
2020-02-14 15:54:24,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,671 [root] DEBUG: Loader: Injecting process 8820 (thread 8824) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,671 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:24,671 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,671 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8820
2020-02-14 15:54:24,687 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8820, ImageBase: 0x00400000
2020-02-14 15:54:24,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8820
2020-02-14 15:54:24,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:24,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:24,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:24,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:24,703 [root] DEBUG: Loader: Injecting process 8820 (thread 8824) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:24,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,703 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:24,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:24,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8820
2020-02-14 15:54:24,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8920
2020-02-14 15:54:25,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,390 [root] DEBUG: Loader: Injecting process 8920 (thread 8924) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,390 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:25,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8920
2020-02-14 15:54:25,421 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8920, ImageBase: 0x00400000
2020-02-14 15:54:25,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8920
2020-02-14 15:54:25,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,421 [root] DEBUG: Loader: Injecting process 8920 (thread 8924) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:25,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,437 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8920
2020-02-14 15:54:25,453 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9032
2020-02-14 15:54:25,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,453 [root] DEBUG: Loader: Injecting process 9032 (thread 9036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:25,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9032
2020-02-14 15:54:25,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9032, ImageBase: 0x00400000
2020-02-14 15:54:25,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9032
2020-02-14 15:54:25,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,483 [root] DEBUG: Loader: Injecting process 9032 (thread 9036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:25,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9032
2020-02-14 15:54:25,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9132
2020-02-14 15:54:25,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,500 [root] DEBUG: Loader: Injecting process 9132 (thread 9136) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:25,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9132
2020-02-14 15:54:25,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9132, ImageBase: 0x00400000
2020-02-14 15:54:25,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9132
2020-02-14 15:54:25,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,530 [root] DEBUG: Loader: Injecting process 9132 (thread 9136) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:25,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9132
2020-02-14 15:54:25,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9232
2020-02-14 15:54:25,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,546 [root] DEBUG: Loader: Injecting process 9232 (thread 9236) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:25,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9232
2020-02-14 15:54:25,562 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9232, ImageBase: 0x00400000
2020-02-14 15:54:25,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9232
2020-02-14 15:54:25,562 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,562 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,578 [root] DEBUG: Loader: Injecting process 9232 (thread 9236) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:25,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9232
2020-02-14 15:54:25,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9332
2020-02-14 15:54:25,828 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,828 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,828 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,828 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,828 [root] DEBUG: Loader: Injecting process 9332 (thread 9336) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,828 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,828 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,828 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:25,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9332
2020-02-14 15:54:25,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9332, ImageBase: 0x00400000
2020-02-14 15:54:25,858 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9332
2020-02-14 15:54:25,858 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,858 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,858 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,858 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,858 [root] DEBUG: Loader: Injecting process 9332 (thread 9336) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,858 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,858 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:25,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9332
2020-02-14 15:54:25,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9432
2020-02-14 15:54:25,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,875 [root] DEBUG: Loader: Injecting process 9432 (thread 9436) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:25,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9432
2020-02-14 15:54:25,890 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9432, ImageBase: 0x00400000
2020-02-14 15:54:25,890 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9432
2020-02-14 15:54:25,890 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,890 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,890 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,905 [root] DEBUG: Loader: Injecting process 9432 (thread 9436) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:25,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9432
2020-02-14 15:54:25,921 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9532
2020-02-14 15:54:25,921 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,921 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,921 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,921 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,921 [root] DEBUG: Loader: Injecting process 9532 (thread 9536) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,921 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:25,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9532
2020-02-14 15:54:25,937 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9532, ImageBase: 0x00400000
2020-02-14 15:54:25,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9532
2020-02-14 15:54:25,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:25,953 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:25,953 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:25,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:25,953 [root] DEBUG: Loader: Injecting process 9532 (thread 9536) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:25,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:25,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:25,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9532
2020-02-14 15:54:25,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9632
2020-02-14 15:54:26,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:26,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:26,765 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:26,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:26,780 [root] DEBUG: Loader: Injecting process 9632 (thread 9636) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:26,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:26,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:26,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:26,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:26,780 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9632
2020-02-14 15:54:26,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9632, ImageBase: 0x00400000
2020-02-14 15:54:26,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9632
2020-02-14 15:54:26,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:26,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:26,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:26,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:26,812 [root] DEBUG: Loader: Injecting process 9632 (thread 9636) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:26,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:26,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:26,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:26,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:26,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9632
2020-02-14 15:54:26,828 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9732
2020-02-14 15:54:26,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:26,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:26,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,000 [root] DEBUG: Loader: Injecting process 9732 (thread 9736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:27,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9732
2020-02-14 15:54:27,250 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9732, ImageBase: 0x00400000
2020-02-14 15:54:27,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9732
2020-02-14 15:54:27,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,265 [root] DEBUG: Loader: Injecting process 9732 (thread 9736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,265 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:27,265 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9732
2020-02-14 15:54:27,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9832
2020-02-14 15:54:27,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,280 [root] DEBUG: Loader: Injecting process 9832 (thread 9836) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,280 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:27,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9832
2020-02-14 15:54:27,296 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9832, ImageBase: 0x00400000
2020-02-14 15:54:27,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9832
2020-02-14 15:54:27,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,312 [root] DEBUG: Loader: Injecting process 9832 (thread 9836) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,312 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:27,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9832
2020-02-14 15:54:27,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9932
2020-02-14 15:54:27,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,328 [root] DEBUG: Loader: Injecting process 9932 (thread 9936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,328 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,328 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,328 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:27,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9932
2020-02-14 15:54:27,342 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9932, ImageBase: 0x00400000
2020-02-14 15:54:27,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9932
2020-02-14 15:54:27,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,358 [root] DEBUG: Loader: Injecting process 9932 (thread 9936) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:27,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9932
2020-02-14 15:54:27,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10032
2020-02-14 15:54:27,453 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,453 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,453 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,453 [root] DEBUG: Loader: Injecting process 10032 (thread 10036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:27,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10032
2020-02-14 15:54:27,483 [root] DEBUG: CreateProcessHandler: Injection info set for new process 10032, ImageBase: 0x00400000
2020-02-14 15:54:27,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10032
2020-02-14 15:54:27,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,483 [root] DEBUG: Loader: Injecting process 10032 (thread 10036) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:27,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10032
2020-02-14 15:54:27,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10132
2020-02-14 15:54:27,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,500 [root] DEBUG: Loader: Injecting process 10132 (thread 10136) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,500 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:27,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10132
2020-02-14 15:54:27,515 [root] DEBUG: CreateProcessHandler: Injection info set for new process 10132, ImageBase: 0x00400000
2020-02-14 15:54:27,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10132
2020-02-14 15:54:27,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,530 [root] DEBUG: Loader: Injecting process 10132 (thread 10136) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,530 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:27,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10132
2020-02-14 15:54:27,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10232
2020-02-14 15:54:27,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,546 [root] DEBUG: Loader: Injecting process 10232 (thread 10236) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,546 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:27,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10232
2020-02-14 15:54:27,578 [root] DEBUG: CreateProcessHandler: Injection info set for new process 10232, ImageBase: 0x00400000
2020-02-14 15:54:27,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10232
2020-02-14 15:54:27,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,578 [root] DEBUG: Loader: Injecting process 10232 (thread 10236) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,578 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:27,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,592 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10232
2020-02-14 15:54:27,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8300
2020-02-14 15:54:27,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,655 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,655 [root] DEBUG: Loader: Injecting process 8300 (thread 8304) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,655 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,655 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,655 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:27,655 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,655 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8300
2020-02-14 15:54:27,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8300, ImageBase: 0x00400000
2020-02-14 15:54:27,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8300
2020-02-14 15:54:27,687 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:27,687 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:27,687 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:27,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:27,687 [root] DEBUG: Loader: Injecting process 8300 (thread 8304) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:27,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:27,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:27,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8300
2020-02-14 15:54:27,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8388
2020-02-14 15:54:28,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,062 [root] DEBUG: Loader: Injecting process 8388 (thread 8376) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8388
2020-02-14 15:54:28,092 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8388, ImageBase: 0x00400000
2020-02-14 15:54:28,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8388
2020-02-14 15:54:28,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,108 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,108 [root] DEBUG: Loader: Injecting process 8388 (thread 8376) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,108 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,108 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,108 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8388
2020-02-14 15:54:28,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8516
2020-02-14 15:54:28,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,125 [root] DEBUG: Loader: Injecting process 8516 (thread 8548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,140 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8516
2020-02-14 15:54:28,155 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8516, ImageBase: 0x00400000
2020-02-14 15:54:28,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8516
2020-02-14 15:54:28,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,155 [root] DEBUG: Loader: Injecting process 8516 (thread 8548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,171 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,171 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8516
2020-02-14 15:54:28,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8660
2020-02-14 15:54:28,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,187 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,187 [root] DEBUG: Loader: Injecting process 8660 (thread 8664) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,187 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,187 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8660
2020-02-14 15:54:28,217 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8660, ImageBase: 0x00400000
2020-02-14 15:54:28,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8660
2020-02-14 15:54:28,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,217 [root] DEBUG: Loader: Injecting process 8660 (thread 8664) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8660
2020-02-14 15:54:28,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8768
2020-02-14 15:54:28,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,250 [root] DEBUG: Loader: Injecting process 8768 (thread 8736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,250 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,265 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8768
2020-02-14 15:54:28,280 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8768, ImageBase: 0x00400000
2020-02-14 15:54:28,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8768
2020-02-14 15:54:28,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,296 [root] DEBUG: Loader: Injecting process 8768 (thread 8736) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,296 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8768
2020-02-14 15:54:28,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8896
2020-02-14 15:54:28,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,312 [root] DEBUG: Loader: Injecting process 8896 (thread 8900) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,312 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,312 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8896
2020-02-14 15:54:28,342 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8896, ImageBase: 0x00400000
2020-02-14 15:54:28,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8896
2020-02-14 15:54:28,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,358 [root] DEBUG: Loader: Injecting process 8896 (thread 8900) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,358 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8896
2020-02-14 15:54:28,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8984
2020-02-14 15:54:28,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,375 [root] DEBUG: Loader: Injecting process 8984 (thread 8988) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,375 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,375 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,375 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8984
2020-02-14 15:54:28,405 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8984, ImageBase: 0x00400000
2020-02-14 15:54:28,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8984
2020-02-14 15:54:28,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,405 [root] DEBUG: Loader: Injecting process 8984 (thread 8988) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,421 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8984
2020-02-14 15:54:28,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7780
2020-02-14 15:54:28,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,437 [root] DEBUG: Loader: Injecting process 7780 (thread 6268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,453 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7780
2020-02-14 15:54:28,467 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7780, ImageBase: 0x00400000
2020-02-14 15:54:28,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7780
2020-02-14 15:54:28,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,483 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,483 [root] DEBUG: Loader: Injecting process 7780 (thread 6268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,483 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,483 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,483 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7780
2020-02-14 15:54:28,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9164
2020-02-14 15:54:28,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,515 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,515 [root] DEBUG: Loader: Injecting process 9164 (thread 9168) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,515 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,515 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,515 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,515 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,515 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9164
2020-02-14 15:54:28,530 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9164, ImageBase: 0x00400000
2020-02-14 15:54:28,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9164
2020-02-14 15:54:28,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,546 [root] DEBUG: Loader: Injecting process 9164 (thread 9168) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9164
2020-02-14 15:54:28,562 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9252
2020-02-14 15:54:28,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,717 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,717 [root] DEBUG: Loader: Injecting process 9252 (thread 9256) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,717 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,717 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,717 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9252
2020-02-14 15:54:28,750 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9252, ImageBase: 0x00400000
2020-02-14 15:54:28,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9252
2020-02-14 15:54:28,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,750 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,750 [root] DEBUG: Loader: Injecting process 9252 (thread 9256) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,750 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,750 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,750 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,750 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9252
2020-02-14 15:54:28,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9384
2020-02-14 15:54:28,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,780 [root] DEBUG: Loader: Injecting process 9384 (thread 9404) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,780 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,780 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,780 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,780 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9384
2020-02-14 15:54:28,812 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9384, ImageBase: 0x00400000
2020-02-14 15:54:28,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9384
2020-02-14 15:54:28,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,812 [root] DEBUG: Loader: Injecting process 9384 (thread 9404) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,812 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,812 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9384
2020-02-14 15:54:28,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9516
2020-02-14 15:54:28,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,842 [root] DEBUG: Loader: Injecting process 9516 (thread 9520) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,842 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,842 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,842 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9516
2020-02-14 15:54:28,875 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9516, ImageBase: 0x00400000
2020-02-14 15:54:28,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9516
2020-02-14 15:54:28,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,875 [root] DEBUG: Loader: Injecting process 9516 (thread 9520) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,890 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,890 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,890 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9516
2020-02-14 15:54:28,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9588
2020-02-14 15:54:28,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,905 [root] DEBUG: Loader: Injecting process 9588 (thread 9592) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,921 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,921 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:28,921 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,921 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9588
2020-02-14 15:54:28,937 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9588, ImageBase: 0x00400000
2020-02-14 15:54:28,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9588
2020-02-14 15:54:28,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:28,953 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:28,953 [root] DEBUG: Loader: Injecting process 9588 (thread 9592) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,953 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:28,953 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,953 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:28,953 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:28,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9588
2020-02-14 15:54:28,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9672
2020-02-14 15:54:28,983 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:28,983 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:28,983 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,000 [root] DEBUG: Loader: Injecting process 9672 (thread 9676) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9672
2020-02-14 15:54:29,015 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9672, ImageBase: 0x00400000
2020-02-14 15:54:29,015 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9672
2020-02-14 15:54:29,015 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,015 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,015 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,030 [root] DEBUG: Loader: Injecting process 9672 (thread 9676) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,030 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,030 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,030 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,030 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,030 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9672
2020-02-14 15:54:29,046 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9748
2020-02-14 15:54:29,046 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,046 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,046 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,046 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,046 [root] DEBUG: Loader: Injecting process 9748 (thread 9780) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,046 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9748
2020-02-14 15:54:29,062 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9748, ImageBase: 0x00400000
2020-02-14 15:54:29,078 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9748
2020-02-14 15:54:29,078 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,078 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,078 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,078 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,078 [root] DEBUG: Loader: Injecting process 9748 (thread 9780) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,078 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,078 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,078 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,078 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,078 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9748
2020-02-14 15:54:29,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9908
2020-02-14 15:54:29,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,092 [root] DEBUG: Loader: Injecting process 9908 (thread 9912) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,092 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,108 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,108 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9908
2020-02-14 15:54:29,125 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9908, ImageBase: 0x00400000
2020-02-14 15:54:29,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9908
2020-02-14 15:54:29,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,125 [root] DEBUG: Loader: Injecting process 9908 (thread 9912) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,125 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,140 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9908
2020-02-14 15:54:29,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9996
2020-02-14 15:54:29,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,155 [root] DEBUG: Loader: Injecting process 9996 (thread 10000) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,155 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,171 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9996
2020-02-14 15:54:29,187 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9996, ImageBase: 0x00400000
2020-02-14 15:54:29,187 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9996
2020-02-14 15:54:29,187 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,187 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,187 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,203 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,203 [root] DEBUG: Loader: Injecting process 9996 (thread 10000) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,203 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,203 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,203 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,203 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,203 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9996
2020-02-14 15:54:29,217 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10124
2020-02-14 15:54:29,217 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,217 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,217 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,217 [root] DEBUG: Loader: Injecting process 10124 (thread 10128) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,233 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10124
2020-02-14 15:54:29,250 [root] DEBUG: CreateProcessHandler: Injection info set for new process 10124, ImageBase: 0x00400000
2020-02-14 15:54:29,250 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10124
2020-02-14 15:54:29,250 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,250 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,250 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,250 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,250 [root] DEBUG: Loader: Injecting process 10124 (thread 10128) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,250 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,250 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,250 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,250 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10124
2020-02-14 15:54:29,280 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7948
2020-02-14 15:54:29,280 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,280 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,280 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,280 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,280 [root] DEBUG: Loader: Injecting process 7948 (thread 7448) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,280 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,280 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,296 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7948
2020-02-14 15:54:29,312 [root] DEBUG: CreateProcessHandler: Injection info set for new process 7948, ImageBase: 0x00400000
2020-02-14 15:54:29,312 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 7948
2020-02-14 15:54:29,312 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,312 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,312 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,312 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,312 [root] DEBUG: Loader: Injecting process 7948 (thread 7448) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,312 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,312 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,328 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,328 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,328 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 7948
2020-02-14 15:54:29,342 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8280
2020-02-14 15:54:29,342 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,342 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,342 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,342 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,342 [root] DEBUG: Loader: Injecting process 8280 (thread 8288) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,358 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,358 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8280
2020-02-14 15:54:29,375 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8280, ImageBase: 0x00400000
2020-02-14 15:54:29,375 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8280
2020-02-14 15:54:29,375 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,375 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,375 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,375 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,390 [root] DEBUG: Loader: Injecting process 8280 (thread 8288) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,390 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,390 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,390 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,390 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,390 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8280
2020-02-14 15:54:29,405 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8504
2020-02-14 15:54:29,405 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,405 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,405 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,405 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,405 [root] DEBUG: Loader: Injecting process 8504 (thread 8508) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,405 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8504
2020-02-14 15:54:29,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8504, ImageBase: 0x00400000
2020-02-14 15:54:29,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8504
2020-02-14 15:54:29,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,437 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,437 [root] DEBUG: Loader: Injecting process 8504 (thread 8508) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,437 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,437 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,437 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,437 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8504
2020-02-14 15:54:29,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8648
2020-02-14 15:54:29,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,467 [root] DEBUG: Loader: Injecting process 8648 (thread 8584) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,483 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,483 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8648
2020-02-14 15:54:29,500 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8648, ImageBase: 0x00400000
2020-02-14 15:54:29,500 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8648
2020-02-14 15:54:29,500 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,500 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,500 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,500 [root] DEBUG: Loader: Injecting process 8648 (thread 8584) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8648
2020-02-14 15:54:29,530 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8680
2020-02-14 15:54:29,530 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,530 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,530 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,530 [root] DEBUG: Loader: Injecting process 8680 (thread 8740) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8680
2020-02-14 15:54:29,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8680, ImageBase: 0x00400000
2020-02-14 15:54:29,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8680
2020-02-14 15:54:29,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,562 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,562 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,562 [root] DEBUG: Loader: Injecting process 8680 (thread 8740) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,562 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,562 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,562 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,562 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,562 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8680
2020-02-14 15:54:29,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8912
2020-02-14 15:54:29,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,578 [root] DEBUG: Loader: Injecting process 8912 (thread 8916) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8912
2020-02-14 15:54:29,608 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8912, ImageBase: 0x00400000
2020-02-14 15:54:29,608 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8912
2020-02-14 15:54:29,608 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,608 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,608 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,608 [root] DEBUG: Loader: Injecting process 8912 (thread 8916) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8912
2020-02-14 15:54:29,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9016
2020-02-14 15:54:29,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,625 [root] DEBUG: Loader: Injecting process 9016 (thread 3232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,625 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9016
2020-02-14 15:54:29,671 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9016, ImageBase: 0x00400000
2020-02-14 15:54:29,671 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9016
2020-02-14 15:54:29,671 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,671 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,671 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,671 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,671 [root] DEBUG: Loader: Injecting process 9016 (thread 3232) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,671 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,671 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,671 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9016
2020-02-14 15:54:29,703 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9076
2020-02-14 15:54:29,703 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,703 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,703 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,703 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,703 [root] DEBUG: Loader: Injecting process 9076 (thread 9052) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,703 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,703 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,703 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,703 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,703 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9076
2020-02-14 15:54:29,717 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9076, ImageBase: 0x00400000
2020-02-14 15:54:29,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9076
2020-02-14 15:54:29,717 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,717 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,717 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,733 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,733 [root] DEBUG: Loader: Injecting process 9076 (thread 9052) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,733 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,733 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,733 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,733 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,733 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9076
2020-02-14 15:54:29,750 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9212
2020-02-14 15:54:29,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,765 [root] DEBUG: Loader: Injecting process 9212 (thread 9156) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9212
2020-02-14 15:54:29,796 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9212, ImageBase: 0x00400000
2020-02-14 15:54:29,796 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9212
2020-02-14 15:54:29,796 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,796 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,796 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,796 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,796 [root] DEBUG: Loader: Injecting process 9212 (thread 9156) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9212
2020-02-14 15:54:29,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9292
2020-02-14 15:54:29,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,812 [root] DEBUG: Loader: Injecting process 9292 (thread 9368) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,812 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9292
2020-02-14 15:54:29,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9292, ImageBase: 0x00400000
2020-02-14 15:54:29,842 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9292
2020-02-14 15:54:29,842 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,842 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,842 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,842 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,842 [root] DEBUG: Loader: Injecting process 9292 (thread 9368) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,842 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,842 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,858 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,858 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,858 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9292
2020-02-14 15:54:29,875 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9484
2020-02-14 15:54:29,875 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,875 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,875 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,875 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,875 [root] DEBUG: Loader: Injecting process 9484 (thread 9504) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,875 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,875 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,875 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,875 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,875 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9484
2020-02-14 15:54:29,890 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9484, ImageBase: 0x00400000
2020-02-14 15:54:29,905 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9484
2020-02-14 15:54:29,905 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,905 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,905 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,905 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,905 [root] DEBUG: Loader: Injecting process 9484 (thread 9504) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,905 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,905 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,905 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,905 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,905 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9484
2020-02-14 15:54:29,937 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9556
2020-02-14 15:54:29,937 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,937 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,937 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,937 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,937 [root] DEBUG: Loader: Injecting process 9556 (thread 9548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,937 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,937 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,937 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:29,937 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,953 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9556
2020-02-14 15:54:29,967 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9556, ImageBase: 0x00400000
2020-02-14 15:54:29,967 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9556
2020-02-14 15:54:29,967 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:29,967 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:29,967 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:29,983 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:29,983 [root] DEBUG: Loader: Injecting process 9556 (thread 9548) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,983 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:29,983 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,983 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:29,983 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:29,983 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9556
2020-02-14 15:54:30,000 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9704
2020-02-14 15:54:30,000 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,000 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,000 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,000 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,000 [root] DEBUG: Loader: Injecting process 9704 (thread 9708) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,000 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,000 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,000 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,000 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,000 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9704
2020-02-14 15:54:30,030 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9704, ImageBase: 0x00400000
2020-02-14 15:54:30,030 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9704
2020-02-14 15:54:30,030 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,030 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,030 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,030 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,030 [root] DEBUG: Loader: Injecting process 9704 (thread 9708) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,046 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,046 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,046 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,046 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,046 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9704
2020-02-14 15:54:30,062 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9792
2020-02-14 15:54:30,062 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,062 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,062 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,062 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,062 [root] DEBUG: Loader: Injecting process 9792 (thread 9812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,062 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,062 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,062 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,062 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,062 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9792
2020-02-14 15:54:30,092 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9792, ImageBase: 0x00400000
2020-02-14 15:54:30,092 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9792
2020-02-14 15:54:30,092 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,092 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,092 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,092 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,092 [root] DEBUG: Loader: Injecting process 9792 (thread 9812) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,092 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,092 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,092 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,092 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,092 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9792
2020-02-14 15:54:30,125 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9968
2020-02-14 15:54:30,125 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,125 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,125 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,125 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,125 [root] DEBUG: Loader: Injecting process 9968 (thread 9972) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,125 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,125 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,125 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,125 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,125 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9968
2020-02-14 15:54:30,140 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9968, ImageBase: 0x00400000
2020-02-14 15:54:30,155 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9968
2020-02-14 15:54:30,155 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,155 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,155 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,155 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,155 [root] DEBUG: Loader: Injecting process 9968 (thread 9972) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,155 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,155 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,155 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,155 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,155 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9968
2020-02-14 15:54:30,171 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10120
2020-02-14 15:54:30,171 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,171 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,171 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,171 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,171 [root] DEBUG: Loader: Injecting process 10120 (thread 10096) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,171 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,171 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,187 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,187 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10120
2020-02-14 15:54:30,203 [root] DEBUG: CreateProcessHandler: Injection info set for new process 10120, ImageBase: 0x00400000
2020-02-14 15:54:30,203 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10120
2020-02-14 15:54:30,203 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,203 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,203 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,217 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,217 [root] DEBUG: Loader: Injecting process 10120 (thread 10096) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,217 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,217 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,217 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,217 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,217 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10120
2020-02-14 15:54:30,233 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10196
2020-02-14 15:54:30,233 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,233 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,233 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,233 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,233 [root] DEBUG: Loader: Injecting process 10196 (thread 10212) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,233 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,233 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,233 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,233 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,250 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10196
2020-02-14 15:54:30,265 [root] DEBUG: CreateProcessHandler: Injection info set for new process 10196, ImageBase: 0x00400000
2020-02-14 15:54:30,265 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 10196
2020-02-14 15:54:30,265 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,265 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,265 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,265 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,265 [root] DEBUG: Loader: Injecting process 10196 (thread 10212) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,265 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,265 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,280 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,280 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,280 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 10196
2020-02-14 15:54:30,296 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8276
2020-02-14 15:54:30,296 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,296 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,296 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,296 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,296 [root] DEBUG: Loader: Injecting process 8276 (thread 8400) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,296 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,296 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,296 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,296 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,312 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8276
2020-02-14 15:54:30,328 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8276, ImageBase: 0x00400000
2020-02-14 15:54:30,328 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8276
2020-02-14 15:54:30,328 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,328 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,328 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,328 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,342 [root] DEBUG: Loader: Injecting process 8276 (thread 8400) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,342 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,342 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,342 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,342 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,342 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8276
2020-02-14 15:54:30,358 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8512
2020-02-14 15:54:30,358 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,358 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,358 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,358 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,358 [root] DEBUG: Loader: Injecting process 8512 (thread 8544) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,358 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,358 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,358 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,375 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,375 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8512
2020-02-14 15:54:30,390 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8512, ImageBase: 0x00400000
2020-02-14 15:54:30,390 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8512
2020-02-14 15:54:30,390 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,390 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,390 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,390 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,405 [root] DEBUG: Loader: Injecting process 8512 (thread 8544) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,405 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,405 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,405 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,405 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,405 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8512
2020-02-14 15:54:30,421 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8608
2020-02-14 15:54:30,421 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,421 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,421 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,421 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,421 [root] DEBUG: Loader: Injecting process 8608 (thread 8668) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,421 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,421 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,421 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,421 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,421 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8608
2020-02-14 15:54:30,437 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8608, ImageBase: 0x00400000
2020-02-14 15:54:30,437 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8608
2020-02-14 15:54:30,437 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,437 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,437 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,453 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,453 [root] DEBUG: Loader: Injecting process 8608 (thread 8668) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,453 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,453 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,453 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,453 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,453 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8608
2020-02-14 15:54:30,467 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8860
2020-02-14 15:54:30,467 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,467 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,467 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,467 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,467 [root] DEBUG: Loader: Injecting process 8860 (thread 8848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,467 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,467 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,467 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,467 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,467 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8860
2020-02-14 15:54:30,483 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8860, ImageBase: 0x00400000
2020-02-14 15:54:30,483 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8860
2020-02-14 15:54:30,483 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,483 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,483 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,500 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,500 [root] DEBUG: Loader: Injecting process 8860 (thread 8848) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,500 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,500 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,500 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,500 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,500 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8860
2020-02-14 15:54:30,515 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8964
2020-02-14 15:54:30,515 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,515 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,515 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,530 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,530 [root] DEBUG: Loader: Injecting process 8964 (thread 8940) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,530 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,530 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,530 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,530 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,530 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8964
2020-02-14 15:54:30,546 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8964, ImageBase: 0x00400000
2020-02-14 15:54:30,546 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8964
2020-02-14 15:54:30,546 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,546 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,546 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,546 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,546 [root] DEBUG: Loader: Injecting process 8964 (thread 8940) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,546 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,546 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,546 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,546 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,546 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8964
2020-02-14 15:54:30,578 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8044
2020-02-14 15:54:30,578 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,578 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,578 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,578 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,578 [root] DEBUG: Loader: Injecting process 8044 (thread 8032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,578 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,578 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,578 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,578 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,578 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8044
2020-02-14 15:54:30,592 [root] DEBUG: CreateProcessHandler: Injection info set for new process 8044, ImageBase: 0x00400000
2020-02-14 15:54:30,592 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 8044
2020-02-14 15:54:30,592 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,592 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,592 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,608 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,608 [root] DEBUG: Loader: Injecting process 8044 (thread 8032) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,608 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,608 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,608 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,608 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 8044
2020-02-14 15:54:30,625 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9264
2020-02-14 15:54:30,625 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,625 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,625 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,625 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,625 [root] DEBUG: Loader: Injecting process 9264 (thread 9268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,625 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,625 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,640 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9264
2020-02-14 15:54:30,655 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9264, ImageBase: 0x00400000
2020-02-14 15:54:30,655 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9264
2020-02-14 15:54:30,655 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,655 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,655 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,687 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,687 [root] DEBUG: Loader: Injecting process 9264 (thread 9268) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,687 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,687 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,687 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,687 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,687 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9264
2020-02-14 15:54:30,717 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9360
2020-02-14 15:54:30,750 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,750 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,750 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,765 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,765 [root] DEBUG: Loader: Injecting process 9360 (thread 9352) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,765 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,765 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,765 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,765 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,765 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9360
2020-02-14 15:54:30,780 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9360, ImageBase: 0x00400000
2020-02-14 15:54:30,780 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9360
2020-02-14 15:54:30,780 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,780 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,780 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,780 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,780 [root] DEBUG: Loader: Injecting process 9360 (thread 9352) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,796 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,796 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,796 [root] DEBUG: InjectDllViaIAT: This image has already been patched.
2020-02-14 15:54:30,796 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,796 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9360
2020-02-14 15:54:30,812 [root] INFO: Announced 32-bit process name: PRODUCT INQUIRY.exe pid: 9604
2020-02-14 15:54:30,812 [lib.api.process] INFO: Option 'injection' with value '1' sent to monitor
2020-02-14 15:54:30,812 [lib.api.process] INFO: Option 'procdump' with value '0' sent to monitor
2020-02-14 15:54:30,812 [lib.api.process] INFO: 32-bit DLL to inject is C:\mravd\dll\RvYCpVc.dll, loader C:\mravd\bin\vdVbsDp.exe
2020-02-14 15:54:30,812 [root] DEBUG: ReadConfig: Successfully loaded pipe name \\.\PIPE\VWqghROB.
2020-02-14 15:54:30,812 [root] DEBUG: Loader: Injecting process 9604 (thread 9608) with C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,812 [root] DEBUG: Process image base: 0x00400000
2020-02-14 15:54:30,812 [root] DEBUG: InjectDllViaIAT: IAT patching with dll name C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,812 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT.
2020-02-14 15:54:30,828 [root] DEBUG: Successfully injected DLL C:\mravd\dll\RvYCpVc.dll.
2020-02-14 15:54:30,828 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 9604
2020-02-14 15:54:30,842 [root] DEBUG: CreateProcessHandler: Injection info set for new process 9604, ImageBase: 0x00400000
2