Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

1, 5, 395, 0 3.70%
1, 5, 395, 0 3.70%
1, 5, 393, 22 33.33%
1, 5, 393, 22 11.11%
1, 5, 393, 18 25.93%
1, 5, 393, 18 3.70%
1, 5, 388, 0 11.11%
1, 5, 388, 0 3.70%
1, 5, 350, 0 3.70%

Relationships

Parent process
Related files

PE structurePE file structure

Show functions
Import table
advapi32.dll
DeleteService, ControlService, QueryServiceStatus, OpenServiceW, ChangeServiceConfig2W, GetLengthSid, StartServiceW, CreateServiceW, OpenSCManagerW, CloseServiceHandle, EqualSid, GetTokenInformation, RegQueryValueExW, RegCloseKey, RegSetValueExW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegOpenKeyExW, OpenThreadToken, DuplicateTokenEx, LookupAccountNameW, SetKernelObjectSecurity, GetAce, GetSecurityInfo, InitializeAcl, LookupPrivilegeValueW, AddAccessAllowedAce, AdjustTokenPrivileges, OpenProcessToken, ConvertStringSidToSidW, MakeAbsoluteSD, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, GetSecurityDescriptorSacl, SetSecurityInfo, RegEnumKeyW, RegDeleteKeyW, AddAce, AddAccessAllowedAceEx, ConvertSidToStringSidW, QueryServiceConfigW, RegOpenKeyW, RegCreateKeyW, CryptAcquireContextW, CryptGenRandom, CryptReleaseContext, RevertToSelf, ImpersonateLoggedOnUser, ImpersonateNamedPipeClient
gdi32.dll
GetPixel
kernel32.dll
GlobalSize, GlobalLock, CompareStringW, CompareStringA, CreateNamedPipeW, ConnectNamedPipe, DisconnectNamedPipe, FlushFileBuffers, WideCharToMultiByte, OutputDebugStringW, Sleep, GetCurrentProcess, GetLastError, GetThreadPriority, DeleteFileW, SetLastError, GetCurrentThread, SetThreadPriority, OpenProcess, SetErrorMode, WaitForSingleObject, CreateProcessW, TerminateProcess, CloseHandle, GetFileAttributesW, InterlockedCompareExchange, LoadLibraryW, QueueUserWorkItem, OpenEventW, SetEvent, UnmapViewOfFile, MapViewOfFile, GetVersionExW, CreateFileMappingW, GetSystemInfo, SetProcessWorkingSetSize, GetCurrentProcessId, GetCurrentThreadId, GetCommandLineW, GetTickCount, OpenMutexW, FreeLibrary, CreateEventW, GlobalMemoryStatusEx, GetLocalTime, GetPrivateProfileIntW, GetExitCodeThread, InterlockedIncrement, InterlockedDecrement, WaitForMultipleObjects, GetExitCodeProcess, OpenFileMappingW, CreateFileW, GetFileTime, InterlockedExchange, GetStartupInfoA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, ReleaseSemaphore, CreateSemaphoreW, OpenThread, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, GetProcessAffinityMask, WriteFile, WaitNamedPipeW, RemoveDirectoryW, SetFileAttributesW, FindNextFileW, GetComputerNameW, GetVersion, LocalFree, MultiByteToWideChar, SearchPathW, GetEnvironmentStringsW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, CreateDirectoryW, GetEnvironmentVariableW, CopyFileW, GetModuleHandleW, GetPrivateProfileStringW, WaitForSingleObjectEx, ExitThread, VirtualAlloc, VirtualFree, GetCurrentDirectoryW, FindFirstFileW, GetModuleFileNameW, GetProcAddress, FindClose, GetFileSize, ReadFile, GetShortPathNameW, DuplicateHandle, ReleaseMutex, CreateMutexW, LoadLibraryExW, HeapFree, CompareFileTime, SetFilePointerEx, GlobalFree, GlobalAlloc, MoveFileExW, GetSystemTime, QueryPerformanceFrequency, SetEndOfFile, HeapAlloc, HeapDestroy, HeapCreate, GetFileSizeEx, SystemTimeToFileTime, QueueUserAPC, GlobalUnlock, VirtualQuery
msvcp80.dll
DllMain
msvcr80.dll
DllMain
netapi32.dll
NetUserDel, NetLocalGroupAdd
ntdll.dll
ZwCreateEvent, ZwYieldExecution, ZwOpenThread, ZwDelayExecution, ZwResetEvent, ZwCreateMutant, ZwOpenMutant, ZwSetInformationFile, ZwWaitForMultipleObjects, ZwQueryFullAttributesFile, ZwQueryInformationThread, RtlFreeUnicodeString, ZwCreateFile, ZwQueryInformationFile, ZwQueryValueKey, ZwSetValueKey, ZwFlushBuffersFile, ZwWriteFile, RtlFormatCurrentUserKeyPath, ZwReadFile, RtlInitUnicodeString, ZwCreateKey, ZwOpenEvent, ZwClose, ZwQueryInformationProcess, ZwReleaseMutant, ZwOpenFile, RtlGetVersion, ZwQueryKey, ZwSetEvent, ZwWaitForSingleObject, ZwOpenKey
ole32.dll
CoUninitialize, CoInitialize, CoCreateGuid
shell32.dll
CommandLineToArgvW, ShellExecuteExW, Shell_NotifyIconW, SHGetSpecialFolderPathW, ShellExecuteW
shlwapi.dll
SHDeleteKeyW
user32.dll
IsWindowVisible, SendMessageTimeoutW, PostMessageW, wsprintfW, WaitForInputIdle, CloseDesktop, GetWindowThreadProcessId, SendMessageW, AllowSetForegroundWindow, SetTimer, GetMessageW, EnumDesktopWindows, TranslateMessage, DispatchMessageW, GetAsyncKeyState, CreateDesktopW, MessageBoxW, DefWindowProcW, GetWindowLongW, LoadIconW, RegisterClassW, RegisterWindowMessageW, CreateWindowExW, SetWindowLongW, GetCursorPos, GetDoubleClickTime, LoadImageW, SetForegroundWindow, CharUpperW, CharUpperBuffW, CharUpperBuffA, CharLowerBuffA, FindWindowW, FindWindowExW, KillTimer, PostThreadMessageW, CharLowerBuffW, LoadStringW, PeekMessageW, MsgWaitForMultipleObjects, GetWindowRect, GetDC, ReleaseDC, GetDesktopWindow
wininet.dll
InternetOpenW, InternetOpenUrlW, InternetReadFile, InternetCloseHandle, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, InternetGetConnectedState, InternetCrackUrlW

forcefield.exe

ZoneAlarm Browser Security by Check Point Software Technologies Ltd. (Signed)

Remove forcefield.exe
Version:   1, 5, 350, 0
MD5:   48b8babcf7bbb5966e1061d8c88b4acb
SHA1:   2d24bfb9fb9aecaa893361bd5da7c6e4f1112c6a

What is forcefield.exe?

Check Point's ZoneAlarm ForceField is designed to secure Web browsing sessions through the use of browser virtualization, inline download scanning and DNS validation services.

About forcefield.exe (from Check Point Software Technologies Ltd.)

Get ZoneAlarm ForceField for your browser. ForceField works hard at Web safety so you don't have to, but you should continue to browse with common sense in mind.

Overview

forcefield.exe executes as a process with the local user's privileges typically within the context of its parent iswsvc.exe (ZoneAlarm Browser Security by Check Point Software Technologies Ltd.). It is set to be start when the PC boots and any user logs into Windows (added to the Run registry key for the all users under the local machine). This is typically installed with the program ZoneAlarm Toolbar published by Check Point, Inc and is most likely removed by most users once installed (72% removed).

DetailsDetails

File name:forcefield.exe
Publisher:Check Point Software Technologies
Product name:ZoneAlarm Browser Security
Typical file path:C:\Program Files\checkpoint\zaforcefield\forcefield.exe
File version:1, 5, 350, 0
Size:1.07 MB (1,125,504 bytes)
Build date:11/3/2011 7:33 AM
Certificate
Issued to:Check Point Software Technologies Ltd.
Authority (CA):VeriSign
Expiration date:Monday, May 5, 2014
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++ 8.0
.NET CLR:No
More details

ResourcesPrograms

The following program will install this file
Check Point, Inc
  72% remove
The ZoneAlarm Security Toolbar installs a OurToolbar toolbar in your Web browser that collects and stores information about your web browsing and sends this information to OurToolbar so they can suggest services or provide ads via the toolbar. It also may automatically download and install updates without notifying the user. This is a PPI (pay per install) toolbar. For each install and for every month the user whose web browser this is...

BehaviorsBehaviors

Startup files (all users) run
Runs under the registry key 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run'
  • 'ISW' → "C:\Program Files\CheckPoint\ZAForceField\ForceField.exe" /icon="hidden"

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.00079969%
0.028634%
Kernel CPU:0.00073850%
0.013761%
User CPU:0.00006119%
0.014873%
Kernel CPU time:5,881 ms/min
100,923,805ms/min
CPU cycles:204,803/sec
17,470,203/sec
Memory
Private memory:25.13 MB
21.59 MB
Private (maximum):11.08 MB
Private (minimum):3.3 MB
Non-paged memory:25.13 MB
21.59 MB
Virtual memory:155.64 MB
140.96 MB
Virtual memory (peak):162.64 MB
169.69 MB
Working set:6.55 MB
18.61 MB
Working set (peak):26.23 MB
37.95 MB
Page faults:17,069/min
2,039/min
I/O
I/O read transfer:1.47 KB/sec
1.02 MB/min
I/O read operations:1/sec
343/min
I/O write transfer:1.48 KB/sec
274.99 KB/min
I/O write operations:1/sec
227/min
I/O other transfer:986 Bytes/sec
448.09 KB/min
I/O other operations:36/sec
1,671/min
Resource allocations
Threads:23
12
Handles:361
600
GUI GDI count:22
103
GUI GDI peak:24
142
GUI USER count:21
49
GUI USER peak:24
71

BehaviorsProcess properties

Integrety level:Medium
Platform:64-bit
Command line:C:\Program Files\checkpoint\zaforcefield\forcefield.exe /icon="hidden"
Owner:User
Parent process:iswsvc.exe (ZoneAlarm Browser Security by Check Point Software Technologies Ltd.)

ResourcesThreads

Averages
 
ntdll.dll
Total CPU:0.00130496%
0.272967%
Kernel CPU:0.00089195%
0.107585%
User CPU:0.00041302%
0.165382%
CPU cycles:13,643/sec
5,741,424/sec
Memory:1.66 MB
1.16 MB
ForceField.exe (main module)
Total CPU:0.00060106%
Kernel CPU:0.00052266%
User CPU:0.00007840%
CPU cycles:6,067/sec
Memory:1.09 MB
MSVCR80.dll
Total CPU:0.00016989%
Kernel CPU:0.00013069%
User CPU:0.00003921%
CPU cycles:1,562/sec
Memory:804 KB

Common loaded modules

These are modules that are typiclaly loaded within the context of this process.

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 51.85%
Microsoft Windows XP 14.81%
Windows Vista Home Basic 7.41%
Windows 8 Pro 7.41%
Windows 7 Professional 7.41%
Windows 7 Ultimate N 3.70%
Windows Vista Ultimate 3.70%
Windows 7 Ultimate 3.70%

Distribution by countryDistribution by country

United States installs about 55.56% of ZoneAlarm Browser Security.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 80.00%
Acer 20.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE