安卓InstantRun - 诺顿安全发现木马
问题描述:
一个星期前,诺顿安全开始寻找文件R.class木马(Trojan.Gen.NPE.2)位于:安卓InstantRun - 诺顿安全发现木马
应用程序\编译\中间体\转换\ instantrun \调试\文件夹\ 1 \ 5 \主\机器人\支持\ V4 \ r.class
和
应用\构建\中间体\变换\ instantrunslicer \调试\文件夹\ 1 \ 5 \ slice_2 \ android \ support \ v4 \ r.class
链接virustotal.com扫描:https://www.virustotal.com/pl/file/282f4e09c102cd93c2f849c9fe9ed570188f5a03395ab84d2457a7c64d7acb1c/analysis/1499458308/
,代码:
package android.support.v4;
import com.android.tools.fd.runtime.IncrementalChange;
import com.android.tools.fd.runtime.InstantReloadException;
public final class R {
public static final long serialVersionUID = 830508538663712626L;
public R() {
IncrementalChange var1 = $change;
if(var1 != null) {
Object[] var10001 = (Object[])var1.access$dispatch("init$args.([Landroid/support/v4/R;[Ljava/lang/Object;)Ljava/lang/Object;", new Object[]{null, new Object[0]});
Object[] var2 = (Object[])var10001[0];
this(var10001, (InstantReloadException)null);
var2[0] = this;
var1.access$dispatch("init$body.(Landroid/support/v4/R;[Ljava/lang/Object;)V", var2);
} else {
super();
}
}
R(Object[] var1, InstantReloadException var2) {
String var3 = (String)var1[1];
switch(var3.hashCode()) {
case -1968665286:
super();
return;
case -71951640:
this();
return;
default:
throw new InstantReloadException(String.format("String switch could not find \'%s\' with hashcode %s in %s", new Object[]{var3, Integer.valueOf(var3.hashCode()), "android/support/v4/R"}));
}
}
}
它是虚惊一场?
对此也感兴趣。代码的哪个方面导致了标记。 –