Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

1, 5, 395, 0 2.86%
1, 5, 395, 0 2.86%
1, 5, 395, 0 2.86%
1, 5, 393, 22 14.29%
1, 5, 393, 22 14.29%
1, 5, 393, 22 5.71%
1, 5, 393, 22 5.71%
1, 5, 393, 18 11.43%
1, 5, 393, 18 11.43%
1, 5, 393, 18 5.71%
1, 5, 393, 18 2.86%
1, 5, 388, 0 2.86%
1, 5, 388, 0 2.86%
1, 5, 388, 0 2.86%
1, 5, 388, 0 2.86%
1, 5, 350, 0 2.86%
1, 5, 350, 0 2.86%
1, 5, 350, 0 2.86%

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
RegCreateKeyExW, CryptReleaseContext, CryptGenRandom, DuplicateTokenEx, LookupAccountNameW, EqualSid, SetSecurityInfo, GetSecurityDescriptorSacl, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, MakeAbsoluteSD, ConvertStringSidToSidW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, GetSecurityInfo, AddAccessAllowedAce, InitializeAcl, GetAce, ImpersonateNamedPipeClient, ImpersonateLoggedOnUser, RevertToSelf, OpenThreadToken, GetTokenInformation, RegEnumValueW, CryptAcquireContextW, RegDeleteValueW, RegSetValueExW, RegOpenKeyExW, RegEnumKeyW, RegCloseKey, RegQueryValueExW, SetKernelObjectSecurity, CreateProcessAsUserW, ConvertSidToStringSidW, RegOverridePredefKey, AddAce, GetLengthSid, CopySid, QueryServiceStatus, SetTokenInformation, AllocateAndInitializeSid, AddAccessDeniedAce, FreeSid, CreateRestrictedToken, GetSidIdentifierAuthority, GetSidSubAuthority, GetSidSubAuthorityCount, GetSecurityDescriptorDacl, RegCreateKeyW, RegFlushKey
gdi32.dll
GetPixel
kernel32.dll
GetFileSize, GetShortPathNameW, WideCharToMultiByte, ReleaseSemaphore, CreateSemaphoreW, CompareStringA, CompareStringW, SearchPathW, VirtualAlloc, CopyFileW, GetCurrentDirectoryW, VirtualFree, OutputDebugStringW, MultiByteToWideChar, MoveFileExW, OpenEventW, FindClose, FindFirstFileW, GetEnvironmentVariableW, CreateDirectoryW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, GetEnvironmentStringsW, GetFileAttributesW, FreeLibrary, GetComputerNameW, LoadLibraryW, GetVersion, GlobalFree, GlobalAlloc, GlobalUnlock, GlobalLock, GlobalSize, VirtualQuery, OpenFileMappingW, InterlockedDecrement, InterlockedIncrement, IsDebuggerPresent, LocalFree, WaitNamedPipeW, SetFilePointerEx, CreateNamedPipeW, ConnectNamedPipe, GetSystemTime, DisconnectNamedPipe, FlushFileBuffers, WriteFile, SetThreadPriority, GetCurrentThread, GetThreadPriority, QueueUserWorkItem, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, UnmapViewOfFile, MapViewOfFile, CreateFileMappingW, GetCurrentThreadId, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, GetTickCount, OpenThread, GetProcessAffinityMask, FormatMessageW, lstrlenW, GetProcessHeap, HeapAlloc, SetFileTime, CreateFileW, DeleteFileW, CreateMutexW, SetEndOfFile, HeapDestroy, HeapCreate, SystemTimeToFileTime, QueueUserAPC, CompareFileTime, QueryPerformanceCounter, ReleaseMutex, ExitThread, GetLocalTime, QueryPerformanceFrequency, GetSystemTimeAsFileTime, UnhandledExceptionFilter, SetUnhandledExceptionFilter, lstrlenA, ReadFile, GetFileSizeEx, HeapFree, GetVersionExW, GetPrivateProfileStringW, GetModuleFileNameW, GetCommandLineW, GetProcAddress, GetModuleHandleW, CreateEventW, InterlockedCompareExchange, CloseHandle, GetCurrentProcessId, ResumeThread, SetLastError, CreateProcessW, OpenProcess, GetCurrentProcess, DuplicateHandle, GetLastError, TerminateProcess, SetEvent, InterlockedExchange, ResetEvent, Sleep, WaitForSingleObject, WaitForMultipleObjects, WaitForSingleObjectEx, GetPrivateProfileIntW, GetLongPathNameW, VirtualProtect, ReadProcessMemory, GetExitCodeThread, GetLogicalDriveStringsW, CreateRemoteThread, SuspendThread, GetSystemDirectoryW, SwitchToThread, FindResourceW, EnumResourceNamesW, LoadLibraryExW, SizeofResource, LoadResource, LockResource, ExpandEnvironmentStringsW, WritePrivateProfileStringW, OpenMutexW, GetExitCodeProcess, SignalObjectAndWait, OpenSemaphoreW, CreateThread, IsBadReadPtr, LocalFileTimeToFileTime, FileTimeToSystemTime, LocalAlloc, GetDriveTypeW, ProcessIdToSessionId, SleepEx, SetCurrentDirectoryW, GetThreadContext, ExitProcess, GetConsoleWindow
msvcp80.dll
DllMain
msvcr80.dll
DllMain
ntdll.dll
ZwOpenMutant, ZwQueryVirtualMemory, ZwReadVirtualMemory, RtlGetVersion, ZwUnmapViewOfSection, ZwDuplicateObject, ZwCreateMutant, ZwDeviceIoControlFile, ZwOpenFile, ZwReleaseSemaphore, ZwMapViewOfSection, ZwCreateSection, ZwOpenEvent, ZwResetEvent, ZwYieldExecution, ZwClose, ZwCreateEvent, ZwQueryInformationThread, ZwDelayExecution, ZwOpenThread, ZwReleaseMutant, ZwWaitForSingleObject, ZwQueryFullAttributesFile, ZwSetInformationFile, ZwSetInformationThread, RtlInitUnicodeString, ZwCreateKey, ZwSetEvent, _wcsicmp, ZwQueryKey, ZwWaitForMultipleObjects, RtlUnwind, _allmul, memcpy, ZwQueryObject, ZwSignalAndWaitForSingleObject, ZwOpenKey, RtlFreeUnicodeString, ZwCreateFile, ZwQueryInformationFile, ZwSetValueKey, ZwQueryValueKey, ZwFlushBuffersFile, ZwWriteFile, RtlFormatCurrentUserKeyPath, ZwReadFile, _fltused, memset, ZwQueryInformationProcess, ZwCreateSemaphore, _snwprintf, NtQueryVirtualMemory, DllMain
ole32.dll
CoCreateInstance, CoUninitialize, CoInitialize, OleRun, StringFromGUID2, CLSIDFromString
shell32.dll
SHGetSpecialFolderPathW, CommandLineToArgvW, ShellExecuteExW, SHGetPathFromIDListW, SHEmptyRecycleBinA, SHEmptyRecycleBinW, SHFileOperationA, SHFileOperationW, ShellExecuteW
shlwapi.dll
SHDeleteKeyW
user32.dll
wsprintfW, GetWindowThreadProcessId, CharLowerBuffW, MessageBoxW, RegisterWindowMessageW, CharLowerBuffA, CharUpperBuffA, CharUpperBuffW, CharUpperW, GetDesktopWindow, GetWindowRect, GetDC, ReleaseDC, EnumWindows, SendMessageTimeoutW, GetParent, IsWindowVisible, GetClassNameW, GetQueueStatus, TranslateMessage, DispatchMessageW, MsgWaitForMultipleObjects, PeekMessageW, GetThreadDesktop, CallNextHookEx, FindWindowW, GetShellWindow, SetWindowsHookExW, FindWindowA, SystemParametersInfoW, GetUserObjectInformationA, DefWindowProcW, SystemParametersInfoA, GetUserObjectInformationW, DefWindowProcA, SendMessageTimeoutA, OpenClipboard, CloseClipboard, EnumClipboardFormats, PostThreadMessageA, GetClipboardData, PostThreadMessageW, LoadImageA, PostMessageA, LoadImageW, PostMessageW, LoadCursorA, SetThreadDesktop, LoadCursorW, SendMessageW, LoadIconA, EnumDesktopWindows, LoadIconW, IsWindow, FindWindowExW, FindWindowExA, NotifyWinEvent, GetAsyncKeyState, OpenDesktopW, CloseDesktop, SendMessageA, AllowSetForegroundWindow, OpenInputDesktop
ws2_32.dll
WSAConnect
Export table
_InitHooks@4
_InitMinMode@4
_IswCoverNewbornExecutable@8
_IswCreateSession@0
_IswCreateSymlink@8
_IswGetModuleByPtr@24
_IswGetPidFor@4
_IswIpcConnect@4
_IswIsFileModified@4
_IswIsPathModified@4
_IswIsProcessSecured@4
_IswLdrMain@4
_IswLog_FlushThread@4
_IswQueryInitHooksParam@0
_IswRunDll@8
_IswSelfVirtualize@4
_IswSetProcessTrusted@4
_IswSlaveDllExec@0
_IswSlaveShExec@0
_IswVirtualHandleType@4
_rundll32_shellexec@16

iswul.dll

ZoneAlarm Browser Security by Check Point Software Technologies Ltd. (Signed)

Remove iswul.dll
Version:   1, 5, 395, 0
MD5:   820ed26c46b0c37ba4795046f910c0f6
SHA1:   cbf852c8f3ea39bfdc93f50474bfdeef6ca10988
SHA256:   3ba5ead73cd5c17fb768cda3491297aaa811021fb5ae3642e3c0672bf55b751f

What is iswul.dll?

Check Point's ZoneAlarm ForceField is designed to secure Web browsing sessions through the use of browser virtualization, inline download scanning and DNS validation services.

About iswul.dll (from Check Point Software Technologies Ltd.)

Get ZoneAlarm ForceField for your browser. ForceField works hard at Web safety so you don't have to, but you should continue to browse with common sense in mind.

Overview

iswul.dll is loaded as dynamic link library that runs in the context of a process. The file is digitally signed by Check Point Software Technologies Ltd. which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:iswul.dll
Publisher:Check Point Software Technologies
Product name:ZoneAlarm Browser Security
Typical file path:C:\Program Files\checkpoint\zaforcefield\iswul_min\iswul.dll
File version:1, 5, 395, 0
Size:549.66 KB (562,856 bytes)
Certificate
Issued to:Check Point Software Technologies Ltd.
Authority (CA):VeriSign
Expiration date:Monday, May 5, 2014
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++ 8.0
.NET CLR:No
More details

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 57.14%
Microsoft Windows XP 17.14%
Windows Vista Home Basic 5.71%
Windows 8 Pro 5.71%
Windows 7 Ultimate 5.71%
Windows 7 Professional 5.71%
Windows 7 Ultimate N 2.86%

Distribution by countryDistribution by country

United States installs about 57.14% of ZoneAlarm Browser Security.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 66.67%
Acer 33.33%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE