Loads the following dynamic libraries:
Uses the following algorithms to encrypt data:
Uses the following algorithms to decrypt data:
Uses administrator priveleges.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about active device administrators.
Gets information about installed apps.
Adds tasks to the system scheduler.
Gets information about sent/received SMS.
Intercepts notifications.
Appears corrupted in a way typical for malicious files.