Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

1, 5, 395, 0 3.70%
1, 5, 395, 0 3.70%
1, 5, 393, 22 33.33%
1, 5, 393, 22 11.11%
1, 5, 393, 18 25.93%
1, 5, 393, 18 3.70%
1, 5, 388, 0 11.11%
1, 5, 388, 0 3.70%
1, 5, 350, 0 3.70%

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
DeleteService, ControlService, QueryServiceStatus, OpenServiceW, ChangeServiceConfig2W, GetLengthSid, StartServiceW, CreateServiceW, OpenSCManagerW, CloseServiceHandle, EqualSid, GetTokenInformation, RegQueryValueExW, RegCloseKey, RegSetValueExW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegOpenKeyExW, OpenThreadToken, DuplicateTokenEx, LookupAccountNameW, SetKernelObjectSecurity, GetAce, GetSecurityInfo, InitializeAcl, LookupPrivilegeValueW, AddAccessAllowedAce, AdjustTokenPrivileges, OpenProcessToken, ConvertStringSidToSidW, MakeAbsoluteSD, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, GetSecurityDescriptorSacl, SetSecurityInfo, RegEnumKeyW, RegDeleteKeyW, AddAce, AddAccessAllowedAceEx, ConvertSidToStringSidW, QueryServiceConfigW, RegOpenKeyW, RegCreateKeyW, CryptAcquireContextW, CryptGenRandom, CryptReleaseContext, RevertToSelf, ImpersonateLoggedOnUser, ImpersonateNamedPipeClient
gdi32.dll
GetPixel
kernel32.dll
GlobalSize, GlobalLock, CompareStringW, CompareStringA, CreateNamedPipeW, ConnectNamedPipe, DisconnectNamedPipe, FlushFileBuffers, WideCharToMultiByte, OutputDebugStringW, Sleep, GetCurrentProcess, GetLastError, GetThreadPriority, DeleteFileW, SetLastError, GetCurrentThread, SetThreadPriority, OpenProcess, SetErrorMode, WaitForSingleObject, CreateProcessW, TerminateProcess, CloseHandle, GetFileAttributesW, InterlockedCompareExchange, LoadLibraryW, QueueUserWorkItem, OpenEventW, SetEvent, UnmapViewOfFile, MapViewOfFile, GetVersionExW, CreateFileMappingW, GetSystemInfo, SetProcessWorkingSetSize, GetCurrentProcessId, GetCurrentThreadId, GetCommandLineW, GetTickCount, OpenMutexW, FreeLibrary, CreateEventW, GlobalMemoryStatusEx, GetLocalTime, GetPrivateProfileIntW, GetExitCodeThread, InterlockedIncrement, InterlockedDecrement, WaitForMultipleObjects, GetExitCodeProcess, OpenFileMappingW, CreateFileW, GetFileTime, InterlockedExchange, GetStartupInfoA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, ReleaseSemaphore, CreateSemaphoreW, OpenThread, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, GetProcessAffinityMask, WriteFile, WaitNamedPipeW, RemoveDirectoryW, SetFileAttributesW, FindNextFileW, GetComputerNameW, GetVersion, LocalFree, MultiByteToWideChar, SearchPathW, GetEnvironmentStringsW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, CreateDirectoryW, GetEnvironmentVariableW, CopyFileW, GetModuleHandleW, GetPrivateProfileStringW, WaitForSingleObjectEx, ExitThread, VirtualAlloc, VirtualFree, GetCurrentDirectoryW, FindFirstFileW, GetModuleFileNameW, GetProcAddress, FindClose, GetFileSize, ReadFile, GetShortPathNameW, DuplicateHandle, ReleaseMutex, CreateMutexW, LoadLibraryExW, HeapFree, CompareFileTime, SetFilePointerEx, GlobalFree, GlobalAlloc, MoveFileExW, GetSystemTime, QueryPerformanceFrequency, SetEndOfFile, HeapAlloc, HeapDestroy, HeapCreate, GetFileSizeEx, SystemTimeToFileTime, QueueUserAPC, GlobalUnlock, VirtualQuery
msvcp80.dll
DllMain
msvcr80.dll
DllMain
netapi32.dll
NetUserDel, NetLocalGroupAdd
ntdll.dll
ZwCreateEvent, ZwYieldExecution, ZwOpenThread, ZwDelayExecution, ZwResetEvent, ZwCreateMutant, ZwOpenMutant, ZwSetInformationFile, ZwWaitForMultipleObjects, ZwQueryFullAttributesFile, ZwQueryInformationThread, RtlFreeUnicodeString, ZwCreateFile, ZwQueryInformationFile, ZwQueryValueKey, ZwSetValueKey, ZwFlushBuffersFile, ZwWriteFile, RtlFormatCurrentUserKeyPath, ZwReadFile, RtlInitUnicodeString, ZwCreateKey, ZwOpenEvent, ZwClose, ZwQueryInformationProcess, ZwReleaseMutant, ZwOpenFile, RtlGetVersion, ZwQueryKey, ZwSetEvent, ZwWaitForSingleObject, ZwOpenKey
ole32.dll
CoUninitialize, CoInitialize, CoCreateGuid
shell32.dll
CommandLineToArgvW, ShellExecuteExW, Shell_NotifyIconW, SHGetSpecialFolderPathW, ShellExecuteW
shlwapi.dll
SHDeleteKeyW
user32.dll
IsWindowVisible, SendMessageTimeoutW, PostMessageW, wsprintfW, WaitForInputIdle, CloseDesktop, GetWindowThreadProcessId, SendMessageW, AllowSetForegroundWindow, SetTimer, GetMessageW, EnumDesktopWindows, TranslateMessage, DispatchMessageW, GetAsyncKeyState, CreateDesktopW, MessageBoxW, DefWindowProcW, GetWindowLongW, LoadIconW, RegisterClassW, RegisterWindowMessageW, CreateWindowExW, SetWindowLongW, GetCursorPos, GetDoubleClickTime, LoadImageW, SetForegroundWindow, CharUpperW, CharUpperBuffW, CharUpperBuffA, CharLowerBuffA, FindWindowW, FindWindowExW, KillTimer, PostThreadMessageW, CharLowerBuffW, LoadStringW, PeekMessageW, MsgWaitForMultipleObjects, GetWindowRect, GetDC, ReleaseDC, GetDesktopWindow
wininet.dll
InternetOpenW, InternetOpenUrlW, InternetReadFile, InternetCloseHandle, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, InternetGetConnectedState, InternetCrackUrlW

forcefield.exe

ZoneAlarm Browser Security by Check Point Software Technologies Ltd. (Signed)

Remove forcefield.exe
Version:   1, 5, 395, 0
MD5:   95a8372083ff8ae33df6676f32b3856a
SHA1:   abdf0f9ded9b0061c379a057ba5a496fbd287389
SHA256:   de6fc3f56c5404fbb33f34a465d3320bccb4087303cf66337415d7a946b29aa5

What is forcefield.exe?

Check Point's ZoneAlarm ForceField is designed to secure Web browsing sessions through the use of browser virtualization, inline download scanning and DNS validation services.

About forcefield.exe (from Check Point Software Technologies Ltd.)

Get ZoneAlarm ForceField for your browser. ForceField works hard at Web safety so you don't have to, but you should continue to browse with common sense in mind.

Overview

forcefield.exe executes as a process under the SYSTEM account with extensive privileges (the system and the administrator accounts have the same file privileges). It is set to be start when the PC boots and any user logs into Windows (added to the Run registry key for the all users under the local machine). The file is digitally signed by Check Point Software Technologies Ltd. which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:forcefield.exe
Publisher:Check Point Software Technologies
Product name:ZoneAlarm Browser Security
Typical file path:C:\Program Files\checkpoint\zaforcefield\forcefield.exe
File version:1, 5, 395, 0
Size:721.66 KB (738,984 bytes)
Certificate
Issued to:Check Point Software Technologies Ltd.
Authority (CA):VeriSign
Expiration date:Monday, May 5, 2014
Digital DNA
PE subsystem:Windows GUI
File packed:No
Code language:Microsoft Visual C++ 8.0
.NET CLR:No
More details

BehaviorsBehaviors

Startup files (all users) run
Runs under the registry key 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run'
  • 'ISW' → "C:\Program Files\CheckPoint\ZAForceField\ForceField.exe" /icon="hidden"

ResourcesResource utilization

(Note: statistics below are averages based on a minimum sample size of 200 unique participants)
Averages
 
CPU
Total CPU:0.03781137%
0.028634%
Kernel CPU:0.02139328%
0.013761%
User CPU:0.01641809%
0.014873%
Memory
Private (maximum):8.58 MB
Private (minimum):8.48 MB

BehaviorsProcess properties

Platform:32-bit
Command line:"C:\Program Files\checkpoint\zaforcefield\forcefield.exe" /icon="hidden"
Owner:SYSTEM

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Home Premium 51.85%
Microsoft Windows XP 14.81%
Windows Vista Home Basic 7.41%
Windows 8 Pro 7.41%
Windows 7 Professional 7.41%
Windows 7 Ultimate N 3.70%
Windows Vista Ultimate 3.70%
Windows 7 Ultimate 3.70%

Distribution by countryDistribution by country

United States installs about 55.56% of ZoneAlarm Browser Security.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 80.00%
Acer 20.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE