Product Tour

Home / Product Tour

Files, Attachments, or URLs

Files, Attachments or URLs are sent to SecondWrite’s Malware DeepViewTM cloud-hosted software automatically using APIs, or manually by security analysts.
Supported File Types:

  • Windows executables (32-bit and 64-bit)
  • Windows DLLs
  • .NET executables
  • PDF
  • MS Word (.DOC and .DOCX)
  • MS PPT (.PPT and .PPTX)
  • MS Excel (XLS and XLSX)
  • HTML
  • URLs
  • Archives (.zip, .rar, 7z, .iso, .tar, .gz,.bz2)

Comprehensive Analysis

SecondWrite leverages patented technology to detect evasive, anti-analysis malware.

*The signatures (also known as behavioral indicators of compromise) shown are part of the SecondWrite report

Scoring & Reporting

After the file or URL is analyzed a JSON or HTML report is automatically returned to the customer.  The report contains the sample’s maliciousness score, classification, list of detected behavioral indicators of compromise, actions the sample undertakes, and much more.