BitCoin Generator V1.2.zip: How to Avoid This Fake and Malicious Software
However, this type of generator works by hashing the output of a previous digest operation; i.e. the input to the hash function at time N is its output at time N-1, with the starting input being a 0-long octet string. The sequence of generated bytes from such a generator is then reproducible. This is useful for test and debugging purposes only and obviously should not be the case in any security-conscious application.
BitCoin Generator V1.2.zipl