Uses the following algorithms to encrypt data:
Uses administrator priveleges.
Gains access to camera interface.
Gains access to telephone information (number, imei, etc.).
Gains access to information about active device administrators.
Gains access to information about installed applications.
Gains access to information about running applications.
Adds tasks to the system scheduler.
Displays its own windows over windows of other applications.
Gains access to information about incoming/outgoing calls.