I am trying to decompile and deobfuscate my proguard obfuscated sample.apk.
Jadx is generating code like this for a line in my proguard obfuscated sample.apk:
ctx.getString(2131034163);
which usually maps to a resource in gen/R.java as:
public static final class string {
public static final int save_exists=0x7f050033;
}
However the R.java that is generated through Jadx looks like:
public final class R {
public static final int ActionBarLayout_android_layout_gravity = 0;
public static final int ActionBar_background = 10;
static {
ActionBar = new int[]{p050c.p051a.p052a.p053a.R.height, p050c.p051a.p052a.p053a.R.title, p050c.p051a.p052a.p053a.R.navigationMode, p050c.p051a.p052a.p053a.R.displayOptions, p050c.p051a.p052a.p053a.R.homeAsUpIndicator};
}
}
So, how can I map 2131034163 to a resource in strings.xml? Is it possible?