Further, one likely outcome of detecting and possibly preventing such suspect activity is the identification of an object or entity, such as a file, that is very likely the method of conveyance of the malicious code or instructions, or ???malware??? to those of skill in the art.