BHIM app repackaging


I used apktool to get the decompile the BHIM apk and rebuild the apk without any modiciation and signed the apk with the help of apk-signer. But when I launched the application on Android pie in redmi note 5 pro and the mobile verification was about to happen, then when mobile verification was about to happen, then BHIM application crashed I got the below log.

Can someone explain what is the reason behind it?

Build fingerprint: 'xiaomi/whyred/whyred:9/PKQ1.180904.001/V11.0.3.0.PEIMIXM:user/release-keys' Revision: '0' ABI: 'arm64' pid: 14218, tid: 14324, name: JavaBridge  >>> in.org.npci.upiapp <<< signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------     x0  0000000000000000  x1  00000000000037f4  x2  0000000000000006  x3  0000000000000008     x4  7251223c5a4d7147  x5  7251223c5a4d7147  x6  7251223c5a4d7147  x7  76356531646e6840     x8  0000000000000083  x9  dc9b1944d568af6d  x10 0000000000000000  x11 fffffffc7ffffbdf     x12 0000000000000001  x13 38396c4351687072  x14 0000000000000050  x15 aaaaaaaaaaaaaaab     x16 00000070375612b0  x17 0000007037480cd0  x18 0000000000030000  x19 000000000000378a     x20 00000000000037f4  x21 0000006f96e88400  x22 0000006f980b3588  x23 0000006f980b3588     x24 0000000000000004  x25 0000006f980b3588  x26 0000006f96e884a0  x27 0000000000000001     x28 0000000000000000  x29 0000006f980b18b0     sp  0000006f980b1870  lr  0000007037474144  pc  000000703747416c  backtrace:     #00 pc 000000000002216c  /system/lib64/libc.so (abort+116)     #01 pc 000000000020a070  /data/app/in.org.npci.upiapp-O8oIsPZrFju_1gK19JzGw==/lib/arm64/libnative-lib.so (gnu_cxx::_verbose_terminate_handler()+236)     #02 pc 00000000001c8464  /data/app/in.org.npci.upiapp-O8oIsPZrFju_1gK19JzGw==/lib/arm64/libnative-lib.so (cxxabiv1::_terminate(void (*)())+8)     #03 pc 00000000001c84d0  /data/app/in.org.npci.upiapp-O8oIsPZrFju__1gK19JzGw==/lib/arm64/libnative-lib.so (std::terminate()+12)     #04 pc 00000000000a8114  /data/app/in.org.npci.upiapp-O8oIsPZrFju__1gK19JzGw==/lib/arm64/libnative-lib.so (Bhim::verifyAndInitAuth()+592)     #05 pc 00000000000a8240  /data/app/in.org.npci.upiapp-O8oIsPZrFju__1gK19JzGw==/lib/arm64/libnative-lib.so (Bhim::getChallenge()+76)     #06 pc 00000000000a9248  /data/app/in.org.npci.upiapp-O8oIsPZrFju__1gK19JzGw==/lib/arm64/libnative-lib.so (Java_in_org_npci_upiapp_HomeActivity_getChallenge+60)     #07 pc 000000000009b97c  /data/app/in.org.npci.upiapp-O8oIsPZrFju__1gK19JzGw==/oat/arm64/base.odex (offset 0x9a000) (com.facebook.react.bridge.CxxModuleWrapperBase.getName [DEDUPED]+124)     #08 pc 0000000000557388  /system/lib64/libart.so (art_quick_invoke_stub+584)     #09 pc 00000000000cfcc8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)     #10 pc 0000000000280338  /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+344)     #11 pc 000000000027a34c  /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+968)     #12 pc 000000000052950c  /system/lib64/libart.so (MterpInvokeVirtualQuick+584)     #13 pc 000000000054d714  /system/lib64/libart.so (ExecuteMterpImpl+29972)     #14 pc 000000000039e6b6  /data/app/in.org.npci.upiapp-O8oIsPZrFju__1gK19JzGw==/oat/arm64/base.vdex (in.org.npci.upiapp.core.JsInterface.getChallenge+8)     #15 pc 0000000000254050  /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.3557229793+488)     #16 pc 0000000000516d7c  /system/lib64/libart.so (artQuickToInterpreterBridge+1020)     #17 pc 00000000005604fc  /system/lib64/libart.so (art_quick_to_interpreter_bridge+92)     #18 pc 0000000000557388  /system/lib64/libart.so (art_quick_invoke_stub+584)     #19 pc 00000000000cfcc8  /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+200)     #20 pc 000000000045dd7c  /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104)     #21 pc 000000000045ee38  /system/lib64/libart.so (art::InvokeVirtualOrInterfaceWithJValues(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, jvalue*)+424)     #22 pc 000000000033404c  /system/lib64/libart.so (art::JNI::CallObjectMethodA(_JNIEnv*, _jobject*, _jmethodID*, jvalue*)+640)     #23 pc 0000000000e0969c  /data/app/com.android.chrome-72a-56BHa1HTrMZRoC7yag==/base.apk (offset 0xbd4000)```