0% found this document useful (0 votes)
4 views3 pages

Aml Crashlog

This document is a crash log detailing an application crash due to a segmentation fault (SIGSEGV) caused by an attempt to access an inaccessible memory address. It includes configuration variables, register states, and a stack trace of the crash. Users are instructed not to send screenshots of the log but to provide the log file for troubleshooting.

Uploaded by

nduttttengg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

Aml Crashlog

This document is a crash log detailing an application crash due to a segmentation fault (SIGSEGV) caused by an attempt to access an inaccessible memory address. It includes configuration variables, register states, and a stack trace of the crash. Users are instructed not to send screenshots of the log but to provide the log file for troubleshooting.

Uploaded by

nduttttengg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

!!! THIS IS A CRASH LOG !!!

If you are experiencing a crash, give us this file.


>>> DO NOT SEND US A SCREENSHOT OF THIS FILE <<<

Config variables: | g_bSimplerCrashLog = 0 | g_bNoSPInLog = 0 | g_bNoModsInLog = 0


| g_bDumpAllThreads = 1 | g_bEHUnwind = 0 | g_bMoreRegsInfo = 1 |
Exception Signal 11 - SIGSEGV (SEGV_ACCERR)
Fault address: 0xD93DE058
An overall reason of the crash:
- An application tried to access the memory address that is unaccessible, protected
or just wrong
Library base: 0xD914A000
libSCAnd.so + 0x294058

----------------------------------------------------
Registers:
R0: 3822837504 0xE3DBDF00
R1: 3644711000 0xD93DE058 (libSCAnd.so + 0x294058)
R2: 3840343744 0xE4E6FEC0
R3: 15 0xF
R4: 3820233216 0xE3B42200
R5: 3842520576 0xE5083600
R6: 3820233348 0xE3B42284
R7: 4290718336 0xFFBF2A80
R8: 3820233216 0xE3B42200
R9: 3842520576 0xE5083600
R10: 3842520800 0xE50836E0
R11: 3842518112 0xE5082C60
R12: 3810535520 0xE3202860 (libc.so + 0xBC860)
SP: 4290718296 0xFFBF2A58
LR: 3643875669 0xD9312155 (libSCAnd.so + 0x1C8155)
PC: 3644711000 0xD93DE058 (libSCAnd.so + 0x294058)
CPSR: 2693660688 0xA08E0010

----------------------------------------------------
Printing 1296 bytes of stack:
04 00 00 00 78 2A BF FF 00 DF DB E3 38 59 01 E9 (SP+0x000) [....x*......8Y..]
6F 95 3B D9 00 22 B4 E3 00 00 00 00 B3 1F 31 D9 (SP+0x010) [o.;.."........1.]
B3 1F 31 D9 FF 87 33 D9 00 DF DB E3 00 00 00 00 (SP+0x020) [..1...3.........]
AD 87 33 D9 A5 AA 33 D9 00 00 00 00 00 00 00 00 (SP+0x030) [..3...3.........]
60 2C 08 E5 00 00 00 00 00 00 00 00 A0 31 08 E5 (SP+0x040) [`,...........1..]
D8 22 B4 E3 40 34 08 E5 00 C0 28 42 00 00 00 00 (SP+0x050) [."..@4....(B....]
C8 22 B4 E3 60 33 08 E5 00 00 E1 41 00 C0 28 42 (SP+0x060) [."..`3.....A..(B]
00 00 00 00 D4 45 63 B4 00 9A 07 E9 D4 45 63 B4 (SP+0x070) [.....Ec......Ec.]
B0 2B BF FF 00 00 00 00 00 9A 07 E9 90 2B BF FF (SP+0x080) [.+...........+..]
04 2B BF FF D7 11 19 E1 00 00 00 00 D0 77 F0 12 (SP+0x090) [.+...........w..]
98 C0 F8 12 00 00 00 00 F0 00 00 00 00 00 00 00 (SP+0x0A0) [................]
00 9A 07 E9 D4 45 63 B4 B0 2B BF FF 78 2C BF FF (SP+0x0B0) [.....Ec..+..x,..]
A4 9A 07 E9 90 2B BF FF 03 00 00 00 DB 79 20 E1 (SP+0x0C0) [.....+.......y..]
78 2C BF FF 00 00 00 00 90 2B BF FF 50 2B BF FF (SP+0x0D0) [x,.......+..P+..]
56 00 00 00 E7 86 16 E1 50 2E BF FF 40 38 BF FF (SP+0x0E0) [V.......P...@8..]
00 00 00 00 0C 00 00 00 00 00 00 00 00 00 00 00 (SP+0x0F0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x100) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x110) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x120) [................]
00 00 00 00 00 00 00 00 00 00 00 00 D0 77 F0 12 (SP+0x130) [.............w..]
98 C0 F8 12 00 00 00 00 A4 47 63 B4 02 00 00 00 (SP+0x140) [.........Gc.....]
00 DF DB E3 E0 36 08 E5 48 2C BF FF E4 2C BF FF (SP+0x150) [.....6..H,...,..]
78 2C BF FF 84 2C BF FF 00 00 00 00 00 00 00 00 (SP+0x160) [x,...,..........]
00 36 08 E5 60 33 08 E5 00 36 08 E5 00 00 00 00 (SP+0x170) [.6..`3...6......]
00 DE DB E3 00 F4 DB E3 00 00 00 00 00 00 00 00 (SP+0x180) [................]
40 34 08 E5 00 00 00 00 00 DE DB E3 40 34 08 E5 (SP+0x190) [@4..........@4..]
00 00 00 00 60 33 08 E5 00 00 00 00 00 00 00 00 (SP+0x1A0) [....`3..........]
00 00 00 00 00 00 00 00 A0 31 08 E5 00 00 00 00 (SP+0x1B0) [.........1......]
00 00 00 00 60 33 08 E5 00 00 00 00 60 2C 08 E5 (SP+0x1C0) [....`3......`,..]
00 00 00 00 00 00 00 00 A0 31 08 E5 00 00 00 00 (SP+0x1D0) [.........1......]
80 2B 08 E5 00 00 00 00 00 00 00 00 60 2C 08 E5 (SP+0x1E0) [.+..........`,..]
80 2B 08 E5 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x1F0) [.+..............]
FF FF FF FF 00 00 00 00 00 F7 DB E3 00 F7 DB E3 (SP+0x200) [................]
00 9A 07 E9 D3 6F 23 E1 00 00 00 00 80 2C BF FF (SP+0x210) [.....o#......,..]
01 00 00 00 70 10 82 DB 00 9A 07 E9 00 9A 07 E9 (SP+0x220) [....p...........]
80 8B 25 E9 00 53 05 E9 00 9A 07 E9 00 5C 00 00 (SP+0x230) [..%..S.......\..]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x240) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x250) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x260) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x270) [................]
00 00 00 00 00 00 00 00 00 80 04 44 00 00 8C 42 (SP+0x280) [...........D...B]
80 FF E8 E3 01 00 00 00 64 AF BF BF 04 01 00 00 (SP+0x290) [........d.......]
00 54 3A 44 00 E0 C4 42 44 65 74 61 69 6C 73 00 (SP+0x2A0) [.T:D...BDetails.]
F8 2C BF FF F8 2C BF FF 64 AF BF BF 80 FF E8 E3 (SP+0x2B0) [.,...,..d.......]
00 22 B4 E3 88 60 46 D9 00 00 00 00 70 2D BF FF (SP+0x2C0) [."...`F.....p-..]
00 00 00 00 40 2D BF FF DE 88 83 B3 B1 A7 31 D9 (SP+0x2D0) [....@-........1.]
00 00 00 00 00 00 00 00 00 00 80 3F 00 00 80 3F (SP+0x2E0) [...........?...?]
00 1E BC E4 00 D0 03 45 00 00 87 44 00 00 00 00 (SP+0x2F0) [.......E...D....]
80 FF E8 E3 00 1E BC E4 00 00 00 00 A3 A3 31 D9 (SP+0x300) [..............1.]
98 2D BF FF 20 00 00 00 00 00 00 00 00 00 00 00 (SP+0x310) [.-..............]
00 D0 03 45 00 00 87 44 1F F7 DC E3 00 F7 DC E3 (SP+0x320) [...E...D........]
53 6F 63 69 64 AF BF BF 80 FF E8 E3 40 61 46 D9 (SP+0x330) [Socid.......@aF.]
80 FF E8 E3 00 00 00 00 00 2E BF FF 00 9A 07 E9 (SP+0x340) [................]
00 C9 36 E1 F3 58 2F D9 00 D0 03 45 00 00 87 44 (SP+0x350) [..6..X/....E...D]
18 2E BF FF 0B 8C 31 D9 01 00 00 00 01 00 00 00 (SP+0x360) [......1.........]
00 00 80 44 00 00 40 44 00 00 F0 43 00 00 A0 43 (SP+0x370) [...D..@D...C...C]
00 00 80 44 00 00 40 44 00 00 80 44 00 00 40 44 (SP+0x380) [...D..@D...D..@D]
6A 73 6F 6E 00 25 5F E1 00 00 00 5C 00 00 00 00 (SP+0x390) [json.%_....\....]
EC 2D BF FF E8 2D BF FF E0 03 B9 E3 DE 88 83 B3 (SP+0x3A0) [.-...-..........]
00 9A 07 E9 80 8B 25 E9 D8 03 B9 E3 C8 03 B9 E3 (SP+0x3B0) [......%.........]
73 6F 63 69 61 6C 20 63 6C 75 62 00 80 8B 25 E9 (SP+0x3C0) [social.club...%.]
23 2E BF FF 18 2E BF FF E6 2D 00 00 64 AF BF BF (SP+0x3D0) [#........-..d...]
00 00 00 00 80 8B 25 E9 07 00 00 00 04 37 63 B4 (SP+0x3E0) [......%......7c.]
00 00 00 00 9F 71 3D B3 04 37 63 B4 00 00 00 00 (SP+0x3F0) [.....q=..7c.....]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x400) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x410) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x420) [................]
00 00 00 00 00 00 00 00 00 00 00 00 E0 2E BF FF (SP+0x430) [................]
C8 2E BF FF 10 00 00 00 00 00 00 00 00 C9 36 E1 (SP+0x440) [..............6.]
DE 88 83 B3 70 60 37 E1 F4 37 63 B4 68 50 F0 12 (SP+0x450) [....p`7..7c.hP..]
E8 5A D9 12 01 00 00 00 DE 88 83 B3 FC 2E BF FF (SP+0x460) [.Z..............]
68 50 F0 12 E8 5A D9 12 38 50 F0 12 00 00 00 00 (SP+0x470) [hP...Z..8P......]
00 00 00 00 00 00 00 00 68 50 F0 12 E8 5A D9 12 (SP+0x480) [........hP...Z..]
38 50 F0 12 38 04 00 00 3D 08 00 00 38 04 00 00 (SP+0x490) [8P..8...=...8...]
00 00 80 3F 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4A0) [...?............]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4B0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4C0) [................]
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (SP+0x4D0) [................]
00 00 00 00 34 69 56 71 98 2F BF FF 78 2F BF FF (SP+0x4E0) [....4iVq./..x/..]
02 00 00 00 00 00 00 00 00 9A 07 E9 00 C9 36 E1 (SP+0x4F0) [..............6.]
62 78 83 B3 C0 55 37 E1 54 31 62 B4 E0 0A D8 12 (SP+0x500) [bx...U7.T1b.....]
----------------------------------------------------
List of loaded mods (count=1):
AML Core (RusJJ aka [-=KILL MAN=-], version 1.2.1)
- GUID: net.rusjj.aml | Base: 0x0 | Path: localpath (core)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy