Executes next shell scripts:
Uses the following algorithms to encrypt data:
Uses the following algorithms to decrypt data:
Uses elevated priveleges.
Gains access to geolocation.
Gains access to network information.
Gains access to telephone information (number, IMEI, etc.).
Gains access to information about installed applications.
Gains access to information about running applications.
Adds tasks to the system scheduler.
Displays its own windows over windows of other applications.
Gains access to information about sent/received SMS messages.