Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x5)
anomaly
Calculates the SHA-1 hash of data. (x2)
file
Calculates the MD5 hash of data. (x2)
file
Might output messages to console. (x5)
anomaly
Generates cryptographically strong random values. (x3)
anomaly
Uses math functions. (x3)
behavior