Behaviors
List of software behaviors discovered with static code analysis.
Might contain potentially obfuscated code or data. (x5)
anomaly
Calculates the MD5 hash of data. (x2)
file
Calculates the SHA-1 hash of data. (x2)
file
Might output messages to console. (x5)
anomaly
Generates cryptographically strong random values. (x3)
anomaly
Uses math functions. (x3)
behavior