Recently Created or Modified Executables Search

Uses binary analysis to identify executable modules. Finds modules deposited by system processes or user activity. Assists with collecting file artifacts associated with cybersecurity incidents.

Version discontinued.
Please See Version on the

Your Activation Code will come in an email from immediately after payment processing completes. Completion may take 24-hours. Please check your SPAM folder if necessary. When you receive it, simply paste it into the labeled box on the Application upgrade window to enable Advanced Analysis mode features.