Loads the following dynamic libraries:
Uses the following algorithms to encrypt data:
Uses administrator priveleges.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about active device administrators.
Gets information about installed apps.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.
Gets information about sent/received SMS.
Intercepts notifications.
Appears corrupted in a way typical for malicious files.