Executes the following shell scripts:
- /system/bin/dex2oat --instruction-set=x86 --dex-file=<Package Folder>/.jiagu/classes.dex --oat-file=<Package Folder>/.jiagu/classes.oat --inline-depth-limit=0 --compiler-filter=speed
- /system/bin/dex2oat --runtime-arg -classpath --runtime-arg & --instruction-set=x86 --instruction-set-features=smp,ssse3,sse4.1,sse4.2,-avx,-avx2,-lock_add,popcnt --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --dex-file=/data/user/0/<Package>/cache/1518650295230.jar --oat-fd=84 --oat-location=/data/user/0/<Package>/cache/1518650295230.dex --compiler-filter=speed
- /system/bin/log -p d -t su /dev/com.android.settings/.socket3357
- /system/bin/log -p d -t su /dev/com.android.settings/.socket3436
- /system/bin/log -p d -t su 10065 /system/bin/app_process32 executing 0 /system/bin/sh using binary /system/bin/sh : sh
- /system/bin/log -p d -t su child exited
- /system/bin/log -p d -t su client exited 1
- /system/bin/log -p d -t su connecting client 3344
- /system/bin/log -p d -t su connecting client 3421
- /system/bin/log -p d -t su remote args: 1
- /system/bin/log -p d -t su remote pid: 3344
- /system/bin/log -p d -t su remote pid: 3421
- /system/bin/log -p d -t su remote pts_slave:
- /system/bin/log -p d -t su remote req pid: 3313
- /system/bin/log -p d -t su remote req pid: 3392
- /system/bin/log -p d -t su remote uid: 10065
- /system/bin/log -p d -t su sending code
- /system/bin/log -p d -t su starting daemon client 10065 10065
- /system/bin/log -p d -t su su invoked.
- /system/bin/log -p d -t su waiting for child exit
- /system/bin/log -p d -t su waiting for user
- /system/bin/log -p e -t su select failed with 2: No such file or directory
- /system/bin/log -p e -t su sqlite3 open /data/user_de/0/com.android.settings/databases/su.sqlite failure: 14
- /system/bin/log -p w -t su request rejected (10065->0 /system/bin/sh)
- su
Uses the following algorithms to encrypt data:
Uses the following algorithms to decrypt data:
Uses elevated priveleges.
Accesses the ITelephony private interface.
Uses special library to hide executable bytecode.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Displays its own windows over windows of other apps.