NMCore.exe process and its network activity

Started by Raf

Raf

NMCore.exe process and its network activity   11 February 2020, 09:47

Hello,
I use Sysinternals Windows Process Explorer to monitor programs' activities. I have NetMaster installed, and therefore have its components' processes NMCore.exe and NMGUI.exe showing in Process Explorer.

My question is about NMCore.exe network activity. The Process Explorer shows more than 500MB in "Network Send Bytes" column for NMCore.exe. This data accumulated in less than 10 hours. What is it sending?

I have disabled remote connection during setup. I'm currently using NetMaster trial version 1.0.1 64-bit on Windows 10 64-bit desktop.

Thank you
SoftPerfect Support forum - Ann avatar image
Ann

Re: NMCore.exe process and its network activity   11 February 2020, 09:57

NMCore.exe itself is not sending anything. It captures other apps' traffic from Windows kernel, processes it, and then reinjects it back after processing. Windows Process Explorer simply sees this activity as if the process was sending its own traffic.

If it is a concern to you, I recommend trying the latest build that implements a different and much faster packet processing method when NetMaster is used in monitoring mode: if there are no assigned priorities/limits and no blocked apps, NetMaster will be able to save a lot of CPU resources and will not be "sending" anything in Process Explorer's point of view.
Please note that if you have some limits set or apps blocked, there will be no change in performance. You would need to undo all limits, allow blocked apps, and reboot for the improvements to take effect.

Reply to this topic

Sometimes you can get the answer faster if you try the forum search and/or have a look at the software user manual to see if your question has already been answered.

Our forum rules are simple:

  • Be polite.
  • Do not spam.
  • If possible, check your spelling and grammar.

Author:

Email:

Subject

A brief and informative title for your message, approximately 4–8 words:

     

Spam prevention: please enter the following code in the input field below.

 **        **     **  ********   **    **  **    ** 
 **        **     **  **     **  ***   **  **   **  
 **        **     **  **     **  ****  **  **  **   
 **        **     **  **     **  ** ** **  *****    
 **         **   **   **     **  **  ****  **  **   
 **          ** **    **     **  **   ***  **   **  
 ********     ***     ********   **    **  **    ** 

Message: