De-obfuscate the stack trace using Proguard GUI Store the Proguard mapping.txt file for each released APK, which will be useful to de-obfuscate crash or exception stack trace. Steps to retrace :- 1. Go to your SDK location -> Android_SDK\adt-bundle-windows-x86-20131030\sdk\tools\proguard\bin folder 2. Run retrace.bat file , choose "Retrace" option. 3. Add your proper mapping.txt 4. And paste the dumped stack trace , stack trace should be from "at" on each line 5. Proguard will replace all method and class names according to the mapping file.
This blog is for ANDROID developers which contains information about development, resolutions of common issues and much more about ANDROID...