Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

1, 5, 395, 0 2.86%
1, 5, 395, 0 2.86%
1, 5, 395, 0 2.86%
1, 5, 393, 22 14.29%
1, 5, 393, 22 14.29%
1, 5, 393, 22 5.71%
1, 5, 393, 22 5.71%
1, 5, 393, 18 11.43%
1, 5, 393, 18 11.43%
1, 5, 393, 18 5.71%
1, 5, 393, 18 2.86%
1, 5, 388, 0 2.86%
1, 5, 388, 0 2.86%
1, 5, 388, 0 2.86%
1, 5, 388, 0 2.86%
1, 5, 350, 0 2.86%
1, 5, 350, 0 2.86%
1, 5, 350, 0 2.86%

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
RegCreateKeyExW, CryptReleaseContext, CryptGenRandom, DuplicateTokenEx, LookupAccountNameW, EqualSid, SetSecurityInfo, GetSecurityDescriptorSacl, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, MakeAbsoluteSD, ConvertStringSidToSidW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, GetSecurityInfo, AddAccessAllowedAce, InitializeAcl, GetAce, ImpersonateNamedPipeClient, ImpersonateLoggedOnUser, RevertToSelf, OpenThreadToken, GetTokenInformation, RegEnumValueW, CryptAcquireContextW, RegDeleteValueW, RegSetValueExW, RegOpenKeyExW, RegEnumKeyW, RegCloseKey, RegQueryValueExW, SetKernelObjectSecurity, CreateProcessAsUserW, ConvertSidToStringSidW, RegOverridePredefKey, AddAce, GetLengthSid, CopySid, QueryServiceStatus, SetTokenInformation, AllocateAndInitializeSid, AddAccessDeniedAce, FreeSid, CreateRestrictedToken, GetSidIdentifierAuthority, GetSidSubAuthority, GetSidSubAuthorityCount, GetSecurityDescriptorDacl, RegCreateKeyW, RegFlushKey
gdi32.dll
GetPixel
kernel32.dll
GetFileSize, GetShortPathNameW, WideCharToMultiByte, ReleaseSemaphore, CreateSemaphoreW, CompareStringA, CompareStringW, SearchPathW, VirtualAlloc, CopyFileW, GetCurrentDirectoryW, VirtualFree, OutputDebugStringW, MultiByteToWideChar, MoveFileExW, OpenEventW, FindClose, FindFirstFileW, GetEnvironmentVariableW, CreateDirectoryW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, GetEnvironmentStringsW, GetFileAttributesW, FreeLibrary, GetComputerNameW, LoadLibraryW, GetVersion, GlobalFree, GlobalAlloc, GlobalUnlock, GlobalLock, GlobalSize, VirtualQuery, OpenFileMappingW, InterlockedDecrement, InterlockedIncrement, IsDebuggerPresent, LocalFree, WaitNamedPipeW, SetFilePointerEx, CreateNamedPipeW, ConnectNamedPipe, GetSystemTime, DisconnectNamedPipe, FlushFileBuffers, WriteFile, SetThreadPriority, GetCurrentThread, GetThreadPriority, QueueUserWorkItem, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, UnmapViewOfFile, MapViewOfFile, CreateFileMappingW, GetCurrentThreadId, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, GetTickCount, OpenThread, GetProcessAffinityMask, FormatMessageW, lstrlenW, GetProcessHeap, HeapAlloc, SetFileTime, CreateFileW, DeleteFileW, CreateMutexW, SetEndOfFile, HeapDestroy, HeapCreate, SystemTimeToFileTime, QueueUserAPC, CompareFileTime, QueryPerformanceCounter, ReleaseMutex, ExitThread, GetLocalTime, QueryPerformanceFrequency, GetSystemTimeAsFileTime, UnhandledExceptionFilter, SetUnhandledExceptionFilter, lstrlenA, ReadFile, GetFileSizeEx, HeapFree, GetVersionExW, GetPrivateProfileStringW, GetModuleFileNameW, GetCommandLineW, GetProcAddress, GetModuleHandleW, CreateEventW, InterlockedCompareExchange, CloseHandle, GetCurrentProcessId, ResumeThread, SetLastError, CreateProcessW, OpenProcess, GetCurrentProcess, DuplicateHandle, GetLastError, TerminateProcess, SetEvent, InterlockedExchange, ResetEvent, Sleep, WaitForSingleObject, WaitForMultipleObjects, WaitForSingleObjectEx, GetPrivateProfileIntW, GetLongPathNameW, VirtualProtect, ReadProcessMemory, GetExitCodeThread, GetLogicalDriveStringsW, CreateRemoteThread, SuspendThread, GetSystemDirectoryW, SwitchToThread, FindResourceW, EnumResourceNamesW, LoadLibraryExW, SizeofResource, LoadResource, LockResource, ExpandEnvironmentStringsW, WritePrivateProfileStringW, OpenMutexW, GetExitCodeProcess, SignalObjectAndWait, OpenSemaphoreW, CreateThread, IsBadReadPtr, LocalFileTimeToFileTime, FileTimeToSystemTime, LocalAlloc, GetDriveTypeW, ProcessIdToSessionId, SleepEx, SetCurrentDirectoryW, GetThreadContext, ExitProcess, GetConsoleWindow
msvcp80.dll
DllMain
msvcr80.dll
DllMain
ntdll.dll
ZwOpenMutant, ZwQueryVirtualMemory, ZwReadVirtualMemory, RtlGetVersion, ZwUnmapViewOfSection, ZwDuplicateObject, ZwCreateMutant, ZwDeviceIoControlFile, ZwOpenFile, ZwReleaseSemaphore, ZwMapViewOfSection, ZwCreateSection, ZwOpenEvent, ZwResetEvent, ZwYieldExecution, ZwClose, ZwCreateEvent, ZwQueryInformationThread, ZwDelayExecution, ZwOpenThread, ZwReleaseMutant, ZwWaitForSingleObject, ZwQueryFullAttributesFile, ZwSetInformationFile, ZwSetInformationThread, RtlInitUnicodeString, ZwCreateKey, ZwSetEvent, _wcsicmp, ZwQueryKey, ZwWaitForMultipleObjects, RtlUnwind, _allmul, memcpy, ZwQueryObject, ZwSignalAndWaitForSingleObject, ZwOpenKey, RtlFreeUnicodeString, ZwCreateFile, ZwQueryInformationFile, ZwSetValueKey, ZwQueryValueKey, ZwFlushBuffersFile, ZwWriteFile, RtlFormatCurrentUserKeyPath, ZwReadFile, _fltused, memset, ZwQueryInformationProcess, ZwCreateSemaphore, _snwprintf, NtQueryVirtualMemory, DllMain
ole32.dll
CoCreateInstance, CoUninitialize, CoInitialize, OleRun, StringFromGUID2, CLSIDFromString
shell32.dll
SHGetSpecialFolderPathW, CommandLineToArgvW, ShellExecuteExW, SHGetPathFromIDListW, SHEmptyRecycleBinA, SHEmptyRecycleBinW, SHFileOperationA, SHFileOperationW, ShellExecuteW
shlwapi.dll
SHDeleteKeyW
user32.dll
wsprintfW, GetWindowThreadProcessId, CharLowerBuffW, MessageBoxW, RegisterWindowMessageW, CharLowerBuffA, CharUpperBuffA, CharUpperBuffW, CharUpperW, GetDesktopWindow, GetWindowRect, GetDC, ReleaseDC, EnumWindows, SendMessageTimeoutW, GetParent, IsWindowVisible, GetClassNameW, GetQueueStatus, TranslateMessage, DispatchMessageW, MsgWaitForMultipleObjects, PeekMessageW, GetThreadDesktop, CallNextHookEx, FindWindowW, GetShellWindow, SetWindowsHookExW, FindWindowA, SystemParametersInfoW, GetUserObjectInformationA, DefWindowProcW, SystemParametersInfoA, GetUserObjectInformationW, DefWindowProcA, SendMessageTimeoutA, OpenClipboard, CloseClipboard, EnumClipboardFormats, PostThreadMessageA, GetClipboardData, PostThreadMessageW, LoadImageA, PostMessageA, LoadImageW, PostMessageW, LoadCursorA, SetThreadDesktop, LoadCursorW, SendMessageW, LoadIconA, EnumDesktopWindows, LoadIconW, IsWindow, FindWindowExW, FindWindowExA, NotifyWinEvent, GetAsyncKeyState, OpenDesktopW, CloseDesktop, SendMessageA, AllowSetForegroundWindow, OpenInputDesktop
ws2_32.dll
WSAConnect
Export table
_InitHooks@4
_InitMinMode@4
_IswCoverNewbornExecutable@8
_IswCreateSession@0
_IswCreateSymlink@8
_IswGetModuleByPtr@24
_IswGetPidFor@4
_IswIpcConnect@4
_IswIsFileModified@4
_IswIsPathModified@4
_IswIsProcessSecured@4
_IswLdrMain@4
_IswLog_FlushThread@4
_IswQueryInitHooksParam@0
_IswRunDll@8
_IswSelfVirtualize@4
_IswSetProcessTrusted@4
_IswSlaveDllExec@0
_IswSlaveShExec@0
_IswVirtualHandleType@4
_rundll32_shellexec@16

iswul.dll

ZoneAlarm Browser Security by Check Point Software Technologies Ltd. (Signed)

Remove iswul.dll
Version:   1, 5, 393, 22
MD5:   6203f47638198f7aa60b827e60bf36f0
SHA1:   a84f23b6b2d09ef5823f2915518beb0c4aeaf6bf
SHA256:   d4e416997f39fe4a485ce0cd88e341d1b4f7d8f19adc1bc009b15a10f1661e63

What is iswul.dll?

Check Point's ZoneAlarm ForceField is designed to secure Web browsing sessions through the use of browser virtualization, inline download scanning and DNS validation services.

About iswul.dll (from Check Point Software Technologies Ltd.)

Get ZoneAlarm ForceField for your browser. ForceField works hard at Web safety so you don't have to, but you should continue to browse with common sense in mind.

Overview

iswul.dll is loaded as dynamic link library that runs in the context of a process. The file is digitally signed by Check Point Software Technologies Ltd. which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:iswul.dll
Publisher:Check Point Software Technologies
Product name:ZoneAlarm Browser Security
Typical file path:C:\Program Files\checkpoint\zaforcefield\iswul_min\iswul.dll
File version:1, 5, 393, 22
Size:549.66 KB (562,856 bytes)
Certificate
Issued to:Check Point Software Technologies Ltd.
Authority (CA):VeriSign
Expiration date:Monday, May 5, 2014
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++ 8.0
.NET CLR:No
More details

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 57.14%
Microsoft Windows XP 17.14%
Windows Vista Home Basic 5.71%
Windows 8 Pro 5.71%
Windows 7 Ultimate 5.71%
Windows 7 Professional 5.71%
Windows 7 Ultimate N 2.86%

Distribution by countryDistribution by country

United States installs about 57.14% of ZoneAlarm Browser Security.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 66.67%
Acer 33.33%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE