File name:

NetLimiter.v4.1.12.exe

Full analysis: https://app.any.run/tasks/78be95d2-8ec8-4c58-95f6-f9eff87aa229
Verdict: Malicious activity
Analysis date: March 16, 2024, 12:41:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1DF06318EF20C35FECB1D440D2BFB3AC

SHA1:

2E95D67219CB022BA9CBE2D6E778209C7812E116

SHA256:

984B9B1398E556178AAE9366701CC3E44ECCFCE85EC34B89B246A4349EBCCF41

SSDEEP:

98304:piDNvhKUua7V4RqwhfWGwKNOutotPGHlUQYYjsv3F+27I9cNiLFq3n/l/9NSQLEM:l3ZkmQbR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • NetLimiter.v4.1.12.exe (PID: 3392)
    • Creates a writable file in the system directory

      • NLSvc.exe (PID: 1020)
      • NLSvc.exe (PID: 3152)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • NetLimiter.v4.1.12.exe (PID: 3392)
    • Uses ROUTE.EXE to obtain the routing table information

      • ns2346.tmp (PID: 696)
    • Executable content was dropped or overwritten

      • NetLimiter.v4.1.12.exe (PID: 3392)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • ns225B.tmp (PID: 2408)
    • Drops 7-zip archiver for unpacking

      • NetLimiter.v4.1.12.exe (PID: 3392)
    • Process drops legitimate windows executable

      • NetLimiter.v4.1.12.exe (PID: 3392)
    • Drops a system driver (possible attempt to evade defenses)

      • NetLimiter.v4.1.12.exe (PID: 3392)
    • The process creates files with name similar to system file names

      • NetLimiter.v4.1.12.exe (PID: 3392)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2432)
      • NLSvc.exe (PID: 1020)
      • NLSvc.exe (PID: 3152)
    • Reads security settings of Internet Explorer

      • NLSvc.exe (PID: 1020)
      • NLSvc.exe (PID: 3152)
      • NLClientApp.exe (PID: 3544)
      • NetLimiter.v4.1.12.exe (PID: 3392)
    • Checks Windows Trust Settings

      • NLSvc.exe (PID: 1020)
      • NLSvc.exe (PID: 3152)
      • NLClientApp.exe (PID: 3544)
    • Reads the Internet Settings

      • NetLimiter.v4.1.12.exe (PID: 3392)
      • NLClientApp.exe (PID: 3544)
    • Reads settings of System Certificates

      • NLClientApp.exe (PID: 3544)
    • Identifying current user with WHOAMI command

      • cmd.exe (PID: 3844)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • NetLimiter.v4.1.12.exe (PID: 3392)
  • INFO

    • Reads the computer name

      • NetLimiter.v4.1.12.exe (PID: 3392)
      • NLSvc.exe (PID: 3152)
      • NLClientApp.exe (PID: 3544)
      • NLSvc.exe (PID: 1020)
    • Checks supported languages

      • NetLimiter.v4.1.12.exe (PID: 3392)
      • ns225B.tmp (PID: 2408)
      • ns2346.tmp (PID: 696)
      • NLSvc.exe (PID: 3152)
      • NLClientApp.exe (PID: 3544)
      • NLSvcCliCnnCheck.exe (PID: 1848)
      • NLSvc.exe (PID: 1020)
      • ns79B4.tmp (PID: 1888)
    • Create files in a temporary directory

      • NetLimiter.v4.1.12.exe (PID: 3392)
      • NLClientApp.exe (PID: 3544)
    • Reads the machine GUID from the registry

      • NLSvc.exe (PID: 1020)
      • NLSvc.exe (PID: 3152)
      • NetLimiter.v4.1.12.exe (PID: 3392)
      • NLClientApp.exe (PID: 3544)
    • Reads the software policy settings

      • NLSvc.exe (PID: 1020)
      • NLSvc.exe (PID: 3152)
      • NLClientApp.exe (PID: 3544)
    • Creates files in the program directory

      • NLSvc.exe (PID: 3152)
    • Manual execution by a user

      • NLClientApp.exe (PID: 3544)
      • explorer.exe (PID: 3336)
      • taskmgr.exe (PID: 1216)
      • cmd.exe (PID: 3844)
    • Checks proxy server information

      • NetLimiter.v4.1.12.exe (PID: 3392)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:12:16 00:54:10+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26112
InitializedDataSize: 428544
UninitializedDataSize: 16384
EntryPoint: 0x350d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.1.12.0
ProductVersionNumber: 4.1.12.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Locktime Software
FileDescription: NetLimiter v4.1.12
FileVersion: 4.1.12.0
LegalCopyright: © Locktime Software
ProductName: NetLimiter v4.1.12
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
85
Monitored processes
17
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start netlimiter.v4.1.12.exe ns225b.tmp no specs netsh.exe no specs ns2346.tmp no specs route.exe no specs ns79b4.tmp no specs msiexec.exe no specs vssvc.exe no specs nlsvc.exe nlsvc.exe nlclientapp.exe no specs nlsvcclicnncheck.exe no specs taskmgr.exe no specs explorer.exe no specs cmd.exe no specs whoami.exe no specs netlimiter.v4.1.12.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
324whoamiC:\Windows\System32\whoami.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
whoami - displays logged on user information
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\whoami.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
696"C:\Users\admin\AppData\Local\Temp\nsn221B.tmp\ns2346.tmp" route.exe delete 95.141.193.133C:\Users\admin\AppData\Local\Temp\nsn221B.tmp\ns2346.tmpNetLimiter.v4.1.12.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsn221b.tmp\ns2346.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1020"C:\Program Files\Locktime Software\NetLimiter 4\NLSvc.exe"C:\Program Files\Locktime Software\NetLimiter 4\NLSvc.exe
services.exe
User:
SYSTEM
Company:
Locktime Software
Integrity Level:
SYSTEM
Description:
NLSvc
Exit code:
0
Version:
4.1.12.0
Modules
Images
c:\program files\locktime software\netlimiter 4\nlsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1216"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1848"C:\Program Files\Locktime Software\NetLimiter 4\NLSvcCliCnnCheck.exe" 2f5962515e164c1faabd5211e136f9ecC:\Program Files\Locktime Software\NetLimiter 4\NLSvcCliCnnCheck.exeNLClientApp.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
4294967295
Modules
Images
c:\program files\locktime software\netlimiter 4\nlsvcclicnncheck.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\api-ms-win-crt-runtime-l1-1-0.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\api-ms-win-core-timezone-l1-1-0.dll
c:\windows\system32\api-ms-win-core-file-l2-1-0.dll
c:\windows\system32\api-ms-win-core-localization-l1-2-0.dll
1888"C:\Users\admin\AppData\Local\Temp\nsn221B.tmp\ns79B4.tmp" msiexec.exe /I "C:\Users\admin\AppData\Local\Temp\NETLIMITER\x86.msi" /qb APPDIR="C:\Program Files\Locktime Software\NetLimiter 4\"C:\Users\admin\AppData\Local\Temp\nsn221B.tmp\ns79B4.tmpNetLimiter.v4.1.12.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsn221b.tmp\ns79b4.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1992msiexec.exe /I "C:\Users\admin\AppData\Local\Temp\NETLIMITER\x86.msi" /qb APPDIR="C:\Program Files\Locktime Software\NetLimiter 4\"C:\Windows\System32\msiexec.exens79B4.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2408"C:\Users\admin\AppData\Local\Temp\nsn221B.tmp\ns225B.tmp" netsh.exe advfirewall firewall delete rule name="all" remoteip=95.141.193.133C:\Users\admin\AppData\Local\Temp\nsn221B.tmp\ns225B.tmpNetLimiter.v4.1.12.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\nsn221b.tmp\ns225b.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2432C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2440route.exe delete 95.141.193.133C:\Windows\System32\ROUTE.EXEns2346.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Route Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\route.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
Total events
16 599
Read events
16 311
Write events
266
Delete events
22

Modification events

(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-100
Value:
DHCP Quarantine Enforcement Client
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-101
Value:
Provides DHCP based enforcement for NAP
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-103
Value:
1.0
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dhcpqec.dll,-102
Value:
Microsoft Corporation
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\napipsec.dll,-1
Value:
IPsec Relying Party
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\napipsec.dll,-2
Value:
Provides IPsec based enforcement for Network Access Protection
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\napipsec.dll,-4
Value:
1.0
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\napipsec.dll,-3
Value:
Microsoft Corporation
(PID) Process:(2672) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:@%SystemRoot%\system32\tsgqec.dll,-100
Value:
RD Gateway Quarantine Enforcement Client
Executable files
96
Suspicious files
6
Text files
10
Unknown types
2

Dropped files

PID
Process
Filename
Type
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\nsn221B.tmp\ns225B.tmpexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\nsn221B.tmp\modern-header.bmpimage
MD5:7E67149F9403156CDA0087FEB460C46D
SHA256:9EA90E6D157E58FD8264DA7B16FE58785341939629E93C1D04B453B98F096B79
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\nsn221B.tmp\nsExec.dllexecutable
MD5:F27689C513E7D12C7C974D5F8EF710D6
SHA256:1F18F4126124B0551F3DBCD0FEC7F34026F930CA509F04435657CEDC32AE8C47
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\nsn221B.tmp\nsis7z.dllexecutable
MD5:80E44CE4895304C6A3A831310FBF8CD0
SHA256:B393F05E8FF919EF071181050E1873C9A776E1A0AE8329AEFFF7007D0CADF592
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\nsn221B.tmp\nsDialogs.dllexecutable
MD5:EC9640B70E07141FEBBE2CD4CC42510F
SHA256:C5BA017732597A82F695B084D1AA7FE3B356168CC66105B9392A9C5B06BE5188
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\nsn221B.tmp\LangDLL.dllexecutable
MD5:109B201717AB5EF9B5628A9F3EFEF36F
SHA256:20E642707EF82852BCF153254CB94B629B93EE89A8E8A03F838EEF6CBB493319
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\NETLIMITER\x86.msiexecutable
MD5:F8CC40EB9D71E3C60CF3596AE7CE4B22
SHA256:B61EA011975FACC0B47AE326A625F9C494669587E48E1232BAE91F7513777214
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\nsn221B.tmp\PACKAGE.pkgcompressed
MD5:7CE9BE9257C9534FF7AE6B4683E13F2D
SHA256:36E5F8F6010A945CDC73AA6F41D2CA4C28B01D6160D5BCCA0679EAE7A0897F13
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\NETLIMITER\x64.msiexecutable
MD5:935930895CDBDA917B89B6D54685E069
SHA256:791E232E2BE22B9FD1FA92EABF41C7DE65FF5DFCCF33CA7E9F618916060E4628
3392NetLimiter.v4.1.12.exeC:\Users\admin\AppData\Local\Temp\NETLIMITER\x86\NLDiag.exe.configxml
MD5:9070D769FD43FB9DEF7E9954FBA4C033
SHA256:CBAF2AE95B1133026C58AB6362AF2F7FB2A1871D7AD58B87BD73137598228D9B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
21
DNS requests
13
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1020
NLSvc.exe
GET
304
2.16.100.155:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?65f8ab8788187727
unknown
unknown
3152
NLSvc.exe
GET
200
104.18.21.226:80
http://crl.globalsign.com/gsextendcodesignsha2g3.crl
unknown
binary
4.49 Kb
unknown
1020
NLSvc.exe
GET
200
104.18.21.226:80
http://crl.globalsign.com/root-r3.crl
unknown
binary
2.01 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1020
NLSvc.exe
2.16.100.168:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
whitelisted
1020
NLSvc.exe
104.18.21.226:80
ocsp2.globalsign.com
CLOUDFLARENET
shared
1020
NLSvc.exe
2.16.100.155:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
whitelisted
3152
NLSvc.exe
173.222.108.147:80
ctldl.windowsupdate.com
Akamai International B.V.
CH
unknown
3152
NLSvc.exe
104.18.21.226:80
ocsp2.globalsign.com
CLOUDFLARENET
shared
3152
NLSvc.exe
173.222.108.243:80
ctldl.windowsupdate.com
Akamai International B.V.
CH
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 2.16.100.168
  • 2.16.100.155
  • 173.222.108.147
  • 173.222.108.243
  • 2.16.100.177
  • 88.221.110.91
  • 88.221.110.106
  • 88.221.110.121
whitelisted
ocsp2.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
crl.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted
ad-repack.ddns.net
  • 0.0.0.0
unknown

Threats

PID
Process
Class
Message
1080
svchost.exe
Potentially Bad Traffic
ET POLICY DNS Query to DynDNS Domain *.ddns .net
No debug info