0% found this document useful (0 votes)
16 views

Mod Menu Crash 2023 06 09-20 01 50

The document describes a crash report from an Infinix device running an Android game. It includes details of the crash such as date, app version, device model, and a stack trace. The crash was caused by a null pointer dereference in the game's code compiled to IL2CPP.

Uploaded by

akbarutoy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Mod Menu Crash 2023 06 09-20 01 50

The document describes a crash report from an Infinix device running an Android game. It includes details of the crash such as date, app version, device model, and a stack trace. The crash was caused by a null pointer dereference in the game's code compiled to IL2CPP.

Uploaded by

akbarutoy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

************* Crash Head ****************

Time Of Crash : 2023_06_09-20_01_50


Device Manufacturer: INFINIX
Device Model : Infinix X669C
Android Version : 12
Android SDK : 31
App VersionName : 2.28.2
App VersionCode : 139
************* Crash Head ****************

java.lang.Error: FATAL EXCEPTION [main]


Unity version : 2020.3.17f1
Device model : INFINIX Infinix X669C
Device fingerprint:
Infinix/X669C-GL/Infinix-X669C:12/SP1A.210812.016/230418V758:user/release-keys
Build Type : Release
Scripting Backend : IL2CPP
ABI : armeabi-v7a
Strip Engine Code : true

Caused by: java.lang.Error: *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** ***
Version '2020.3.17f1 (a4537701e4ab)', Build type 'Release', Scripting Backend
'il2cpp', CPU 'armeabi-v7a'
Build fingerprint:
'Infinix/X669C-GL/Infinix-X669C:12/SP1A.210812.016/230418V758:user/release-keys'
Revision: '0'
ABI: 'arm'
Timestamp: 2023-06-09 20:01:48+0700
pid: 15358, tid: 15374, name: FinalizerDaemon >>> com.pockettrend.neomonsters <<<
uid: 10233
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x8
Cause: null pointer dereference
r0 00000000 r1 80000081 r2 80000081 r3 f28d7458
r4 d2ae7fc0 r5 d2adefe0 r6 f28d7410 r7 c163a400
r8 decaf1c0 r9 00000000 r10 decaec70 r11 decaebd0
ip c16335c8 sp decaebc8 lr c0478614 pc c0478614

backtrace:
#00 pc 00266614
/data/app/~~xXTwFiuqwLrtVvX36-r8kw==/com.pockettrend.neomonsters-
2WBE4viH4V6EJZTQ1YEE5g==/lib/arm/libil2cpp.so (BuildId:
d17460d0a93bc3a88fc64bc379358ecb6a1be2)
#01 pc 00279548
/data/app/~~xXTwFiuqwLrtVvX36-r8kw==/com.pockettrend.neomonsters-
2WBE4viH4V6EJZTQ1YEE5g==/lib/arm/libil2cpp.so (BuildId:
d17460d0a93bc3a88fc64bc379358ecb6a1be2)
#02 pc 00276e84
/data/app/~~xXTwFiuqwLrtVvX36-r8kw==/com.pockettrend.neomonsters-
2WBE4viH4V6EJZTQ1YEE5g==/lib/arm/libil2cpp.so (BuildId:
d17460d0a93bc3a88fc64bc379358ecb6a1be2)
#03 pc 001d31a1
/data/app/~~xXTwFiuqwLrtVvX36-r8kw==/com.pockettrend.neomonsters-
2WBE4viH4V6EJZTQ1YEE5g==/lib/arm/libunity.so (BuildId:
ca8cf3f9666ffb2a6e72a0991732f817c8499342)
#04 pc 000d571f
/data/app/~~xXTwFiuqwLrtVvX36-r8kw==/com.pockettrend.neomonsters-
2WBE4viH4V6EJZTQ1YEE5g==/lib/arm/libunity.so (BuildId:
ca8cf3f9666ffb2a6e72a0991732f817c8499342)
#05 pc 000d574b
/data/app/~~xXTwFiuqwLrtVvX36-r8kw==/com.pockettrend.neomonsters-
2WBE4viH4V6EJZTQ1YEE5g==/lib/arm/libunity.so (BuildId:
ca8cf3f9666ffb2a6e72a0991732f817c8499342)
#06 pc 003bd39d /apex/com.android.art/lib/libart.so
(art_quick_alloc_string_from_bytes_region_tlab_instrumented+44) (BuildId:
2849c6a2d9a8980f3d392a00370631)

at libil2cpp.0x266614(Native Method)
at libil2cpp.0x279548(Native Method)
at libil2cpp.0x276e84(Native Method)
at libunity.0x1d31a1(Native Method)
at libunity.0xd571f(Native Method)
at libunity.0xd574b(Native Method)
at
libart.art_quick_alloc_string_from_bytes_region_tlab_instrumented(art_quick_alloc_s
tring_from_bytes_region_tlab_instrumented:44)

You might also like