
Description
Provide specific APK, DEX, or file hash
CameraGo.apk (Parrot043, 2020-04-13)
Describe the bug
`Microsoft Windows [Version 10.0.18362.959]
(c) 2019 Microsoft Corporation. All rights reserved.
E:\Android Reverse Engineering Tools\Deobfuscator>java -jar simplify.jar "E:\Android Reverse Engineering Tools\Deobfuscator\deobfuscateme.dex"
[1 / 6321] Processing top level class Lige;
(1 / 3) Executing top level method: Lige;->()V
Simplifying: Lige;->()V
Optimizations:
constantized ifs = 0
constantized ops = 0
dead assignments removed = 0
dead ops removed = 0
dead results removed = 0
nops removed = 0
peephole optmizations = 0
unreflected fields = 0
unreflected methods = 0
useless gotos removed = 0
(2 / 3) Executing top level method: Lige;->()V
Simplifying: Lige;->()V
Optimizations:
constantized ifs = 0
constantized ops = 0
dead assignments removed = 1
dead ops removed = 0
dead results removed = 0
nops removed = 0
peephole optmizations = 0
unreflected fields = 0
unreflected methods = 0
useless gotos removed = 0
(3 / 3) Executing top level method: Lige;->a(ILjava/lang/Object;)Ljava/lang/Object;
Simplifying: Lige;->a(ILjava/lang/Object;)Ljava/lang/Object;
Exception in thread "main" java.lang.NullPointerException
at org.cf.smalivm.context.HeapItem.getValueType(HeapItem.java:93)
at org.cf.simplify.strategy.ConstantPropagationStrategy.canConstantizeAddress(ConstantPropagationStrategy.java:97)
at java.util.stream.ReferencePipeline$2$1.accept(Unknown Source)
at java.util.stream.IntPipeline$4$1.accept(Unknown Source)
at java.util.Spliterators$IntArraySpliterator.forEachRemaining(Unknown Source)
at java.util.Spliterator$OfInt.forEachRemaining(Unknown Source)
at java.util.stream.AbstractPipeline.copyInto(Unknown Source)
at java.util.stream.AbstractPipeline.wrapAndCopyInto(Unknown Source)
at java.util.stream.ReduceOps$ReduceOp.evaluateSequential(Unknown Source)
at java.util.stream.AbstractPipeline.evaluate(Unknown Source)
at java.util.stream.ReferencePipeline.collect(Unknown Source)
at org.cf.simplify.strategy.ConstantPropagationStrategy.getValidAddresses(ConstantPropagationStrategy.java:107)
at org.cf.simplify.strategy.ConstantPropagationStrategy.perform(ConstantPropagationStrategy.java:48)
at org.cf.simplify.Optimizer.simplify(Optimizer.java:109)
at org.cf.simplify.Launcher.executeMethods(Launcher.java:221)
at org.cf.simplify.Launcher.run(Launcher.java:141)
at org.cf.simplify.Main.main(Main.java:14)
E:\Android Reverse Engineering Tools\Deobfuscator>`
To Reproduce
Took the classes.dex and tried to decompile
java -jar simplify.jar "E:\Android Reverse Engineering Tools\Deobfuscator\deobfuscateme.dex"
Attempted work-arounds
Did you try any work-arounds? Did you read the README?
Didnt found any workarounds, yes!
Screenshots
If applicable, add screenshots to help explain your problem.
Additional context
Add any other context about the problem here.