File details
File name: cltmng.exe
Name: Search Protect
Description: Search Protect by Conduit
Version: 2.8.11.9
Size: 3.84 MB
Original file name: SearchProtect (R)
Digital certificate
Certificate authority:
VeriSign
Effective date: 2/17/2010
Expiration date: 3/30/2013
Resource utilization
 | CPU utilization averages |
Total CPU: 0.0017525842%
Privileged CPU:
0.0000762962%

User CPU:
0.00167628805268%

Privileged CPU time: 3822.02 ms
Privileged CPU time /min: 1 ms
CPU cycle count:
860,862,360
CPU cycle count /min: 5,933,574
 | Memory utilization averages |
Committed memory:
98.52 MB
Peak committed memory: 108.4 MB
Paged memory:
8.8 MB
Peak paged memory: 10.19 MB
Paged system memory:
147.47 KB
Non-paged system memory: 18.55 KB
Working set memory:
8.07 MB
Peak working set memory: 17.72 MB
Min working set memory: 2.82 MB
Private memory:
8.8 MB
Page faults:
122,289
Page faults /min: 27
 | Process I/O averages |
Total read operations:
976
Read operations /min: 1
Total read transfer: 15.86 MB
Read transfer /min: 3.62 KB
Total write operations:
44
Write operations /min: 1
Total write transfer: 5.2 MB
Write transfer /min: 1.19 KB
Total other operations:
72,293
Other operations /min: 16
Total other transfer: 3.59 MB
Other Transfer /min: 840 Bytes
 | GUI Object Averages |
GDI objects:
4
Peak GDI objects: 6
USER objects:
24
Peak USER objects: 29
Resources
Handle count average: 510
Thread count average: 21
Thread resource averages
ntdll.dll

Total CPU: 0.000362819271%
Privileged CPU: 0.000295915099%
User CPU: 0.000066904172%
CPU Cycle count /sec: 10,877
Module memory size: 1.23 MB
Total CPU: 0.000051538505%
Privileged CPU: 0.000024321548%
User CPU: 0.000027216957%
CPU Cycle count /sec: 5,228
Module memory size: 3.9 MB
Process details
Runs as (owner): User
Integrety level: Medium
Windows platform: 32-bit
Parent Process
Process Command
"C:\Program Files1\SearchProtect\SearchProtect\bin\cltmng.exe"
Startup files (all users) run details
Name: SearchProtectAll
Command: C:\Program Files\SearchProtect\bin\cltmng.exe
Startup files (user) run details
Name: SearchProtect
Command: C:\users\user\appdata\Roaming\SearchProtect\bin\cltmng.exe
Image hashes
MD5: 6146db81623e92a7061c4438e6283be3
SHA-1: 341e8f6aa8d19a8d8a6c19e33c678b74772650b1
PE image details
Subsystem: Windows GUI
Langauge*: Microsoft Visual C++ 10.0
File packed: No
Import Table
advapi32.dll

GetUserNameA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
DeregisterEventSource
ReportEventA
RegisterEventSourceA
OpenProcessToken
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegNotifyChangeKeyValue
RegCreateKeyExW
CreateProcessAsUserW
GetLengthSid
SetTokenInformation
ConvertStringSidToSidW
DuplicateTokenEx
GetSidSubAuthorityCount
GetSidSubAuthority
GetTokenInformation
RegEnumKeyExW
CheckTokenMembership
FreeSid
AllocateAndInitializeSid
OpenThreadToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetUserNameW
crypt32.dll

CryptQueryObject
CertFindCertificateInStore
CertGetNameStringW
CertFreeCertificateContext
CertCloseStore
CryptMsgClose
CryptMsgGetParam
dbghelp.dll

SymInitialize
SymFunctionTableAccess64
SymGetModuleBase64
StackWalk64
MiniDumpWriteDump
SymGetSymFromAddr64
SymGetLineFromAddr64
gdi32.dll

GetStockObject
DeleteObject
CreateSolidBrush
SetWindowOrgEx
GetWindowOrgEx
kernel32.dll

IsProcessorFeaturePresent
HeapSize
HeapReAlloc
HeapDestroy
InitializeCriticalSectionAndSpinCount
RaiseException
TlsSetValue
OpenEventA
TlsGetValue
TlsFree
TlsAlloc
CreateEventA
HeapAlloc
GetProcessHeap
GetStringTypeExW
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
SystemTimeToFileTime
ReadFile
SetFilePointer
FindResourceExW
LockResource
SizeofResource
LoadResource
FindResourceW
GetLocaleInfoW
GetUserDefaultLCID
GetVersionExW
CreateProcessW
OpenProcess
LocalAlloc
FlushConsoleInputBuffer
LoadLibraryA
GetStdHandle
GetFileType
GetVersion
LCMapStringW
UnmapViewOfFile
HeapFree
SetProcessShutdownParameters
GetCurrentProcessId
GetComputerNameW
GetLastError
AreFileApisANSI
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
Sleep
InterlockedExchange
DecodePointer
EncodePointer
lstrlenW
FormatMessageA
WaitForSingleObjectEx
CreateDirectoryW
GetSystemTime
ResetEvent
SetEvent
WaitForMultipleObjects
QueueUserWorkItem
CreateMutexW
OpenMutexW
GetTempPathW
InterlockedIncrement
GetModuleHandleExW
FreeLibrary
GetModuleHandleW
LoadLibraryW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
FormatMessageW
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
SetUnhandledExceptionFilter
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetLocalTime
GlobalMemoryStatus
GetSystemTimeAsFileTime
OutputDebugStringA
GetModuleHandleA
GetProcAddress
GetVersionExA
VirtualQuery
GetSystemInfo
GetFileTime
CreateFileA
GetModuleFileNameA
FileTimeToDosDateTime
FileTimeToLocalFileTime
WriteFile
lstrlenA
lstrcpyA
lstrcpynA
GetFileInformationByHandle
WaitForSingleObject
PostQueuedCompletionStatus
GetQueuedCompletionStatus
ReadDirectoryChangesW
CreateIoCompletionPort
CreateEventW
GetDiskFreeSpaceExW
CloseHandle
GetFileSize
CreateFileW
CopyFileW
GetFileAttributesW
FindClose
SetFileAttributesW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
DeleteFileW
GetModuleFileNameW
ResumeThread
ReleaseSemaphore
SetLastError
ProcessIdToSessionId
DllMain
msvcp100.dll
msvcr100.dll
ole32.dll

CoInitializeEx
CoSetProxyBlanket
CoUninitialize
CoCreateInstance
OleInitialize
CLSIDFromString
CoInitialize
CoInitializeSecurity
CoWaitForMultipleHandles
StringFromGUID2
CoCreateGuid
psapi.dll

EnumProcessModules
GetModuleBaseNameW
GetModuleFileNameExW
GetProcessImageFileNameW
EnumProcesses
rpcrt4.dll

NdrClientCall2
NdrServerCall2
RpcBindingFree
RpcEpResolveBinding
RpcStringBindingComposeW
RpcServerRegisterIfEx
RpcServerUnregisterIfEx
RpcObjectSetType
RpcBindingInqObject
RpcImpersonateClient
RpcObjectInqType
RpcRevertToSelfEx
I_RpcBindingInqTransportType
I_RpcBindingInqLocalClientPID
RpcServerUseProtseqEpW
RpcBindingSetObject
RpcStringFreeW
RpcBindingFromStringBindingW
shell32.dll

ShellExecuteW
SHCreateDirectoryExW
SHGetFolderPathW
shlwapi.dll

PathFileExistsW
UrlUnescapeW
user32.dll

RegisterWindowMessageW
GetWindowThreadProcessId
FindWindowW
CharUpperW
PostThreadMessageW
SetWindowLongW
GetWindowLongW
GetClassInfoW
RegisterClassW
SetTimer
GetMessageW
LoadStringW
DispatchMessageW
TranslateMessage
DestroyWindow
MessageBoxA
GetDesktopWindow
GetSystemMetrics
wsprintfW
GetProcessWindowStation
GetUserObjectInformationW
PostQuitMessage
DefWindowProcW
LoadIconW
LoadCursorW
RegisterClassExW
CreateWindowExW
ShowWindow
UpdateWindow
KillTimer
GetWindowRect
IsWindow
PostMessageW
GetCursorPos
FindWindowExW
FillRect
SendMessageW
ScreenToClient
ClientToScreen
GetClientRect
SetFocus
IsChild
GetFocus
PeekMessageW
MsgWaitForMultipleObjects
version.dll

VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
wininet.dll

InternetCrackUrlW
InternetGetConnectedState
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCheckConnectionW
InternetAttemptConnect
HttpOpenRequestA
HttpAddRequestHeadersA
InternetSetCookieA
HttpQueryInfoA
HttpEndRequestW
InternetWriteFile
HttpSendRequestExW
HttpSendRequestA
HttpSendRequestW
InternetReadFile