URL:

http://assets.sli.do/download/switcher-win/1_3_0_3109/slido_switcher_1_3_0_3109.exe

Full analysis: https://app.any.run/tasks/226a2578-2a3b-45f7-bb5b-aa4f755a9783
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 15, 2019, 06:56:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

402A05A8F6ED285809A4151443F22039

SHA1:

CC1755CACA5E4B1AE84137105EDA10FD4D228712

SHA256:

A23E97A1FAE390CF9331C599DD099754C2AD205AF6966FE44406D6F40DA1E07D

SSDEEP:

3:N1KfhiuBKLxNyISy9sdNC9NyAV9dJ:CJaNyIcwNyAVR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • iexplore.exe (PID: 2080)
      • slido_switcher_1_3_0_3109.exe (PID: 3944)
      • msiexec.exe (PID: 900)
      • msiexec.exe (PID: 2276)
    • Application was dropped or rewritten from another process

      • slido_switcher_1_3_0_3109.exe (PID: 3944)
      • Slido Switcher.exe (PID: 3332)
      • CefSharp.BrowserSubprocess.exe (PID: 3240)
      • CefSharp.BrowserSubprocess.exe (PID: 3208)
    • Uses Microsoft Installer as loader

      • slido_switcher_1_3_0_3109.exe (PID: 3944)
    • Loads dropped or rewritten executable

      • Slido Switcher.exe (PID: 3332)
      • CefSharp.BrowserSubprocess.exe (PID: 3240)
      • CefSharp.BrowserSubprocess.exe (PID: 3208)
    • Loads the Task Scheduler DLL interface

      • slido_switcher_1_3_0_3109.exe (PID: 3944)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2080)
      • iexplore.exe (PID: 2612)
      • slido_switcher_1_3_0_3109.exe (PID: 3944)
      • msiexec.exe (PID: 900)
      • msiexec.exe (PID: 2276)
    • Executed as Windows Service

      • vssvc.exe (PID: 3672)
    • Executed via COM

      • DrvInst.exe (PID: 2980)
    • Reads Environment values

      • MsiExec.exe (PID: 2152)
      • Slido Switcher.exe (PID: 3332)
    • Starts CMD.EXE for commands execution

      • slido_switcher_1_3_0_3109.exe (PID: 3944)
      • cmd.exe (PID: 3932)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 3932)
    • Creates files in the user directory

      • msiexec.exe (PID: 2276)
    • Application launched itself

      • cmd.exe (PID: 3932)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2612)
    • Creates files in the user directory

      • iexplore.exe (PID: 2080)
      • iexplore.exe (PID: 2612)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2612)
      • iexplore.exe (PID: 2080)
    • Application launched itself

      • iexplore.exe (PID: 2612)
      • msiexec.exe (PID: 2276)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 724)
      • MsiExec.exe (PID: 2152)
      • MsiExec.exe (PID: 2832)
    • Searches for installed software

      • msiexec.exe (PID: 2276)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2276)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3672)
    • Writes to a desktop.ini file (may be used to cloak folders)

      • msiexec.exe (PID: 2276)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 2276)
    • Reads settings of System Certificates

      • Slido Switcher.exe (PID: 3332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
18
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start iexplore.exe iexplore.exe slido_switcher_1_3_0_3109.exe msiexec.exe msiexec.exe no specs msiexec.exe msiexec.exe no specs vssvc.exe no specs drvinst.exe no specs msiexec.exe no specs slido switcher.exe cefsharp.browsersubprocess.exe no specs cefsharp.browsersubprocess.exe no specs cmd.exe no specs attrib.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
384ATTRIB -r "C:\Users\admin\AppData\Local\Temp\EXE5C6A.bat" C:\Windows\system32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
724C:\Windows\system32\MsiExec.exe -Embedding A75BD97DAA00B146244317F50EA33CB6 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
900"C:\Windows\system32\msiexec.exe" /i http://assets.sli.do/download/switcher-win/1_3_0_3109/setup.msi AI_SETUPEXEPATH=C:\Users\admin\Downloads\slido_switcher_1_3_0_3109.exe SETUPEXEDIR=C:\Users\admin\Downloads\ EXE_CMD_LINE="/exenoupdates /forcecleanup " C:\Windows\system32\msiexec.exe
slido_switcher_1_3_0_3109.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1896ATTRIB -r "C:\Users\admin\AppData\Local\Temp\AIE2128.tmp" C:\Windows\system32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\attrib.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2080"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2612 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2152C:\Windows\system32\MsiExec.exe -Embedding A4DFB6DC17DEC4C25EA871FC85862276 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2276C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2588C:\Windows\system32\cmd.exe /S /D /c" cls"C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
2612"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2832C:\Windows\system32\MsiExec.exe -Embedding 523433DB2E5451A0C905F15D223D81FDC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
2 799
Read events
2 261
Write events
521
Delete events
17

Modification events

(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{DAD67869-BF29-11E9-9885-5254004A04AF}
Value:
0
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2612) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E307080004000F000600380033002F01
Executable files
82
Suspicious files
23
Text files
63
Unknown types
79

Dropped files

PID
Process
Filename
Type
2612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2612iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2612iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF5AF9B57980BDB653.TMP
MD5:
SHA256:
3944slido_switcher_1_3_0_3109.exeC:\Users\admin\AppData\Local\Temp\AIE2128.tmp.part
MD5:
SHA256:
3944slido_switcher_1_3_0_3109.exeC:\Users\admin\AppData\Local\Temp\MSI2726.tmp
MD5:
SHA256:
2612iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFB0B13531C051D9BA.TMP
MD5:
SHA256:
2612iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{DAD67869-BF29-11E9-9885-5254004A04AF}.dat
MD5:
SHA256:
900msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI2C74.tmp
MD5:
SHA256:
900msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI2CE2.tmp
MD5:
SHA256:
900msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI2D03.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
24
DNS requests
17
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3944
slido_switcher_1_3_0_3109.exe
HEAD
200
54.230.95.218:80
http://assets.sli.do/download/switcher-win/1_3_0_3109/setup.msi
US
whitelisted
3944
slido_switcher_1_3_0_3109.exe
GET
200
54.230.95.218:80
http://assets.sli.do/download/switcher-win/1_3_0_3109/setup.msi
US
executable
1.09 Mb
whitelisted
2080
iexplore.exe
GET
200
54.230.95.218:80
http://assets.sli.do/download/switcher-win/1_3_0_3109/slido_switcher_1_3_0_3109.exe
US
executable
2.03 Mb
whitelisted
2276
msiexec.exe
GET
200
54.230.95.218:80
http://assets.sli.do/download/switcher-win/1_3_0_3109/setup.msi
US
executable
1.09 Mb
whitelisted
2276
msiexec.exe
GET
200
54.230.95.218:80
http://assets.sli.do/download/switcher-win/1_3_0_3109/setup1.cab
US
compressed
66.7 Mb
whitelisted
900
msiexec.exe
GET
200
54.230.95.218:80
http://assets.sli.do/download/switcher-win/1_3_0_3109/setup.msi
US
executable
1.09 Mb
whitelisted
3332
Slido Switcher.exe
GET
200
205.185.216.10:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.6 Kb
whitelisted
3332
Slido Switcher.exe
GET
200
13.107.4.50:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
56.6 Kb
whitelisted
2612
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
3332
Slido Switcher.exe
GET
200
13.33.216.121:80
http://x.ss2.us/x.cer
US
der
1.27 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
900
msiexec.exe
54.230.95.218:80
assets.sli.do
Amazon.com, Inc.
US
whitelisted
2612
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3332
Slido Switcher.exe
13.33.223.49:443
accounts-switcher.sli.do
Amazon.com, Inc.
US
unknown
3332
Slido Switcher.exe
13.33.216.121:80
x.ss2.us
Amazon.com, Inc.
US
suspicious
3332
Slido Switcher.exe
13.33.223.172:443
accounts-switcher.sli.do
Amazon.com, Inc.
US
unknown
3332
Slido Switcher.exe
205.185.216.10:80
www.download.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3332
Slido Switcher.exe
13.107.4.50:80
www.download.windowsupdate.com
Microsoft Corporation
US
whitelisted
3332
Slido Switcher.exe
172.217.18.8:443
www.googletagmanager.com
Google Inc.
US
whitelisted
172.217.22.10:443
ajax.googleapis.com
Google Inc.
US
whitelisted
13.33.223.118:443
cdn.statuspage.io
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
assets.sli.do
  • 54.230.95.218
  • 54.230.95.7
  • 54.230.95.188
  • 54.230.95.4
whitelisted
api.logentries.com
  • 54.217.226.43
  • 54.217.226.25
  • 54.217.226.19
unknown
api.sli.do
  • 52.214.79.129
  • 34.255.150.56
  • 54.171.29.29
malicious
accounts-switcher.sli.do
  • 13.33.223.49
  • 13.33.223.47
  • 13.33.223.106
  • 13.33.223.172
whitelisted
x.ss2.us
  • 13.33.216.121
  • 13.33.216.38
  • 13.33.216.142
  • 13.33.216.106
whitelisted
www.download.windowsupdate.com
  • 205.185.216.10
  • 205.185.216.42
  • 13.107.4.50
whitelisted
www.googletagmanager.com
  • 172.217.18.8
whitelisted
cdn.statuspage.io
  • 13.33.223.118
  • 13.33.223.202
  • 13.33.223.251
  • 13.33.223.231
whitelisted
ajax.googleapis.com
  • 172.217.22.10
  • 172.217.18.10
  • 172.217.23.138
  • 216.58.206.10
  • 216.58.207.42
  • 216.58.207.74
  • 172.217.16.170
  • 216.58.208.42
  • 172.217.16.138
  • 172.217.22.42
  • 172.217.22.106
  • 172.217.16.202
  • 172.217.18.106
  • 172.217.23.170
  • 172.217.21.202
  • 216.58.205.234
whitelisted

Threats

PID
Process
Class
Message
2080
iexplore.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
2080
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
900
msiexec.exe
Potential Corporate Privacy Violation
SUSPICIOUS [PTsecurity] Executable application_x-msi Download
2276
msiexec.exe
Potential Corporate Privacy Violation
SUSPICIOUS [PTsecurity] Executable application_x-msi Download
2276
msiexec.exe
Misc activity
SUSPICIOUS [PTsecurity] Using msiexec.exe for Downloading non-MSI file
5 ETPRO signatures available at the full report
Process
Message
Slido Switcher.exe
LE: Adding Line: { "Date": "2019-08-15T07:58:32.1899688+01:00", "Machine": "USER-PC", "ProcessId": "3332", "AppVersion": "Win 1.3.0.3109", "Level": "Info", "Class": "Slido_Switcher.App", "Message": "App started. Instance ID: 5e4076ae-86d7-4e87-bcd4-aa5fc80d1544" }
Slido Switcher.exe
Getting "LOGENTRIES_TOKEN" from ServiceRuntime: FAIL.
Slido Switcher.exe
Getting "LOGENTRIES_TOKEN" from ConfigurationManager: FAIL.
Slido Switcher.exe
Getting "Logentries.Token" from ServiceRuntime: FAIL.
Slido Switcher.exe
Getting "Logentries.Token" from ServiceRuntime: FAIL.
Slido Switcher.exe
Getting "Logentries.Token" from ConfigurationManager: PASS.
Slido Switcher.exe
LE: Found Cloud Configuration settings for Logentries.Token
Slido Switcher.exe
LE: Starting Logentries asynchronous socket client.
Slido Switcher.exe
LE: Queueing: { "Date": "2019-08-15T07:58:32.1899688+01:00", "Machine": "USER-PC", "ProcessId": "3332", "AppVersion": "Win 1.3.0.3109", "Level": "Info", "Class": "Slido_Switcher.App", "Message": "App started. Instance ID: 5e4076ae-86d7-4e87-bcd4-aa5fc80d1544" }
Slido Switcher.exe
LE: ReopenConnection