Executes the following shell scripts:
- /system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_max_freq
- /system/bin/cat /sys/devices/system/cpu/cpu0/cpufreq/cpuinfo_min_freq
- /system/bin/dex2oat --runtime-arg -classpath --runtime-arg & --instruction-set=x86 --instruction-set-features=smp,ssse3,sse4.1,sse4.2,-avx,-avx2,-lock_add,popcnt --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --dex-file=/data/user/0/<Package>/.00000000000/A3AEECD8.dex --oat-fd=35 --oat-location=/data/user/0/<Package>/.11111111111/A3AEECD8.dex --compiler-filter=speed
- date
- getprop
- grep u0_a65
- id
- ip link
- ls /
- ls /sys/class/thermal
- mkdir -p <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/
- netstat -apn
- ping -c 3 -w 10 mobile.shuzilm.cn
- ping -c 3 -w 10 telecom.shuzilm.cn
- ping -c 3 -w 10 unicom.shuzilm.cn
- ps
- service call iphonesubinfo 1
- sh -c echo 0brezpSGcJ5Xr89hSkpnbPpf00XFLms6 > <SD-Card>/../../../../../..<SD-Card>/Android/ZHVzY2Lk
- sh -c echo N0d8I1Rjg3NEQyRDMyRTg0OTFGQzk5NDVGMUU4MEZBNTUwYnJlenBTR2NKNVhyODloU2twbmJQcGYwMFhGTG1zNg== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/.ZHVzY2Lk
- sh -c echo NUEzOTkxNUVFRkYyMkYzRTVGODhCMDBFMDE3OEI3MkVZMzAwVw== > <SD-Card>/../../../../../..<SD-Card>/.n_d
- sh -c echo NUEzOTkxNUVFRkYyMkYzRTVGODhCMDBFMDE3OEI3MkVZMzAwVw== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_d
- sh -c echo NkM3NjVBRkE3MTk5MUQ5NTVGNjc4QzZGMjg2NzgyNjExVE5P > <SD-Card>/../../../../../..<SD-Card>/.n_c
- sh -c echo NkM3NjVBRkE3MTk5MUQ5NTVGNjc4QzZGMjg2NzgyNjExVE5P > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_c
- sh -c echo QTQ1NDE4MDAxMEUyNjdDQUVEOEE0NjgzREMwRUIwQTEyMDE5MDgwMTAwMDE= > <SD-Card>/../../../../../..<SD-Card>/..ccvid
- sh -c echo QTQ1NDE4MDAxMEUyNjdDQUVEOEE0NjgzREMwRUIwQTEyMDE5MDgwMTAwMDE= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/.ccvid
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/._system.dat
- sh -c echo QjU4NUVFQTBCMEQ3MkI1Mzg5QjM5ODQ1MzQ1NUNFMDMzQzdBQjU6ODg2Qzc4OjI3RERDMw== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_system.dat
- sh -c echo QjcyOEVEM0JFODkyQzNGNEE1NjI0OTE0QTQ2QTVEMzgwS0JM > <SD-Card>/../../../../../..<SD-Card>/.n_b
- sh -c echo QjcyOEVEM0JFODkyQzNGNEE1NjI0OTE0QTQ2QTVEMzgwS0JM > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_b
- sh -c echo QzZCODhDMEU5QkVDRkZCMENFRjlDMEI3QzQ4M0MwMjdENTAyNDc6NjA5ODU4OjRFQzgwMg== > <SD-Card>/../../../../../..<SD-Card>/._android.dat
- sh -c echo QzZCODhDMEU5QkVDRkZCMENFRjlDMEI3QzQ4M0MwMjdENTAyNDc6NjA5ODU4OjRFQzgwMg== > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/_android.dat
- sh -c echo RDBCNTk5QjlGNDU2MkI4NTU3MUE3Qzk0NzRCMzE2NjN5QWdTdXM0c3pzQ1RqbWFmOThUc0Q1YWd1M25vRzBvdDNVdlhkT1RVM2pVa3d3L1UyakdqTGZtVFdIb0hzeFNBUGJKVG1GaS80bHBJZEk3aUdXc3hob0tkdnRScm5EbmM0SEFMOEhjNnA2VWJxUG1TamY4Y2xmWHAwak1vOVlNaHpBOUVkcU9mSkcyeEFOcVlnMWlDRXVFYmFvY3dIb0JPVk9wMWFaTStydlVzYk5ja0lnbnY4VmQycVpQbWVWVzE= > <SD-Card>/../../../../../..<SD-Card>/..ccdid
- sh -c echo RDBCNTk5QjlGNDU2MkI4NTU3MUE3Qzk0NzRCMzE2NjN5QWdTdXM0c3pzQ1RqbWFmOThUc0Q1YWd1M25vRzBvdDNVdlhkT1RVM2pVa3d3L1UyakdqTGZtVFdIb0hzeFNBUGJKVG1GaS80bHBJZEk3aUdXc3hob0tkdnRScm5EbmM0SEFMOEhjNnA2VWJxUG1TamY4Y2xmWHAwak1vOVlNaHpBOUVkcU9mSkcyeEFOcVlnMWlDRXVFYmFvY3dIb0JPVk9wMWFaTStydlVzYk5ja0lnbnY4VmQycVpQbWVWVzE= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/.ccdid
- sh -c echo RUNFNUJDQ0JCNDZERjgzNDBBNzY2NTVCOTk4QTdBQjJSSUoxSzY= > <SD-Card>/../../../../../..<SD-Card>/.n_a
- sh -c echo RUNFNUJDQ0JCNDZERjgzNDBBNzY2NTVCOTk4QTdBQjJSSUoxSzY= > <SD-Card>/../../../../../..<SD-Card>/Android/Data/System/local/n_a
- sh -c ps | grep u0_a65
Uses the following algorithms to encrypt data:
- AES-CBC-PKCS5Padding
- AES-CBC-PKCS7Padding
- AES-GCM-NoPadding
- DESede
- RSA-ECB-PKCS1Padding
Uses the following algorithms to decrypt data:
- AES-CBC-PKCS5Padding
- AES-CBC-PKCS7Padding
- AES-GCM-NoPadding
- desede-CBC-NoPadding
Accesses the ITelephony private interface.
Uses special library to hide executable bytecode.
Gets information about location.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about active device administrators.
Gets information about installed apps.
Displays its own windows over windows of other apps.