Behaviors
List of software behaviors discovered with static code analysis.
Calculates the SHA-512 hash of data. (x2)
file
Calculates the SHA-256 hash of data. (x2)
file
Calculates the SHA-1 hash of data. (x2)
file
Converts binary data to its string representation, commonly used in obfuscation. (x2)
packer
Concatenates strings. (x2)
behavior
Might output messages to console. (x2)
anomaly
Uses math functions. (x2)
behavior
Contains multi-line comments. (x2)
behavior