Executes the following shell scripts:
- /system/lib/arm/houdini <Package Folder>/files/.temp/linker <Package Folder>/files/.temp/linker com.android.47141516.3567 3567 21 22
- /system/lib/arm/houdini <Package Folder>/files/.temp/linker <Package Folder>/files/.temp/linker com.android.4db4bc7a.5009 5009 21 22
- chmod 755 /data/user/0/<Package>/files/.temp/Alert.jar
- chmod 755 /data/user/0/<Package>/files/.temp/LIAPPClient.sc
- chmod 755 /data/user/0/<Package>/files/.temp/LIAPPEgg.jar
- chmod 755 /data/user/0/<Package>/files/.temp/LIAPPEgg.sc
- chmod 755 /data/user/0/<Package>/files/.temp/LIAPPEggHound.sc
- chmod 755 /data/user/0/<Package>/files/.temp/LIAPPEggShell.jar
- chmod 755 /data/user/0/<Package>/files/.temp/linker
- getprop init.svc.adbd
- uname -r
Loads the following dynamic libraries:
Uses the following algorithms to decrypt data:
Uses special library to hide executable bytecode.
Gets information about installed apps.
Adds tasks to the system scheduler.
Displays its own windows over windows of other apps.
Requests the system alert window permission.
Sample from Google Play Store.