VideoHelp Forum
+ Reply to Thread
Page 5 of 19
FirstFirst ... 3 4 5 6 7 15 ... LastLast
Results 121 to 150 of 541
Thread
  1. Originally Posted by shellcmd View Post
    on your emulator android device , also have not Firefox or other browsers?
    Yes, the only browser that it has on the ARM version is this WebTest thing that doesn't run Widevine correctly! If I try to install Chrome or Firefox, etc., it either crashes or doesn't run Widevine. The Play Store version of Android Pie still doesn't have Chrome, but at the very least, it let me run Firefox when I installed it correctly through the Play Store... but it has no ability to run frida-server, since something about the root's different. And I think the only reason they're choosing x86 is because it has Chrome preinstalled!
    Quote Quote  
  2. Originally Posted by HomeStarRunnerTron View Post
    Originally Posted by shellcmd View Post
    on your emulator android device , also have not Firefox or other browsers?
    Yes, the only browser that it has on the ARM version is this WebTest thing that doesn't run Widevine correctly! If I try to install Chrome or Firefox, etc., it either crashes or doesn't run Widevine. The Play Store version of Android Pie still doesn't have Chrome, but at the very least, it let me run Firefox when I installed it correctly through the Play Store... but it has no ability to run frida-server, since something about the root's different. And I think the only reason they're choosing x86 is because it has Chrome preinstalled!
    ok , thanks.
    Last edited by shellcmd; 8th May 2023 at 06:02.
    Quote Quote  
  3. Originally Posted by shellcmd View Post
    because looks like many sites block android emulator CDMs from Android studio.

    Do you have any specific example of this? I have yet to find any.
    Quote Quote  
  4. Originally Posted by larits View Post
    Originally Posted by shellcmd View Post
    because looks like many sites block android emulator CDMs from Android studio.

    Do you have any specific example of this? I have yet to find any.
    had send a PM , thank you if you can test it .
    Quote Quote  
  5. Originally Posted by larits View Post
    Originally Posted by shellcmd View Post
    because looks like many sites block android emulator CDMs from Android studio.

    Do you have any specific example of this? I have yet to find any.
    vdocipher is one I learnt recently.
    Quote Quote  
  6. I have the same error in my terminal output:

    2023-03-23 06:58:56 PM - Helpers.Scanner - 85 - ERROR - unable to process the message
    2023-03-23 06:58:56 PM - Helpers.Scanner - 86 - ERROR - {'type': 'error', 'description': 'Error: access violation accessing 0x3', 'stack': 'Error: access violation accessing 0x3\n at <anonymous> (frida/runtime/core.js:141)\n at readStdString (/script1.js:316)\n at onLeave (/script1.js:361)', 'fileName': 'frida/runtime/core.js', 'lineNumber': 141, 'columnNumber': 1}
    2023-03-23 06:58:56 PM - Helpers.Scanner - 87 - ERROR - None

    What can I do / did you do to solve this?


    Originally Posted by counterfactual View Post
    Originally Posted by cedric8528 View Post


    Let's have a look in dumper-main directory.

    You will find a directory (private-keys) containing the 2 files

    Image
    [Attachment 68358 - Click to enlarge]



    you just have to rename the 2 files respectively in :
    device_client_id_blob
    device_private_key
    Cedric, thanks for this great post. I have followed all the instructions, and amended them slightly for use on a Mac.
    One thing to note is that it can be difficult to get the adb shell to run as root. However, this can be overcome by selecting an emulated device which does not have the Play Store, and then using the command
    Code:
    adb -s emulator-5554 root
    Obviously replacing emulator-5554 with the one for your actual device.

    After installing frida and starting the server locally, I start the dump-keys.py application. It starts well, and appears to recognize when I go to a DRM encrypted site, but then it does not produce any output (like those two files you mention). It does display one error
    Code:
    2023-01-19 07:50:06 AM - Helpers.Scanner - 85 - ERROR - unable to process the message
    2023-01-19 07:50:06 AM - Helpers.Scanner - 86 - ERROR - {'type': 'error', 'description': 'Error: access violation accessing 0x3', 'stack': 'Error: access violation accessing 0x3\n    at <anonymous> (frida/runtime/core.js:141)\n    at readStdString (/script1.js:316)\n    at onLeave (/script1.js:361)', 'fileName': 'frida/runtime/core.js', 'lineNumber': 141, 'columnNumber': 1}
    2023-01-19 07:50:06 AM - Helpers.Scanner - 87 - ERROR - None
    But I do not see where it is going wrong. Did you select a device that has Google Play Store? I can't think why this would be necessary, but I am running out of ideas.

    Here's the full output from terminal:
    Code:
    dumper git:(main) ✗ python3 dump_keys.py
    2023-01-19 07:48:00 AM - root - 16 - INFO - Connected to Android Emulator 5554
    2023-01-19 07:48:00 AM - root - 17 - INFO - scanning all processes for the following libraries
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=170, name="init", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=172, name="ueventd", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=192, name="logd", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=193, name="lmkd", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=194, name="servicemanager", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=195, name="hwservicemanager", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=196, name="sh", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=201, name="qemu-props", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=204, name="vold", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=210, name="android.system.suspend@1.0-service", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=211, name="keystore2", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=212, name="android.hardware.atrace@1.0-service", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=213, name="android.hardware.keymaster@4.1-service", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=256, name="tombstoned", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=338, name="dhcpclient", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=345, name="statsd", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=346, name="netd", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=347, name="zygote64", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=351, name="android.hidl.allocator@1.0-service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=352, name="android.hardware.audio.service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=353, name="android.hardware.authsecret@1.0-service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=354, name="android.hardware.bluetooth@1.1-service.btlinux", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=355, name="android.hardware.camera.provider@2.4-service_64", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=356, name="android.hardware.camera.provider@2.7-service-google", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=357, name="android.hardware.cas@1.2-service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=358, name="android.hardware.contexthub@1.1-service.mock", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=359, name="android.hardware.drm@1.0-service", parameters={})
    2023-01-19 07:48:12 AM - Helpers.Scanner - 82 - INFO - Running libwvdrmengine.so at 0x7cfcc447f000
    Error: Error: unable to intercept function at 0x7cfcc46248e0; please file a bug at F: _lcc46
    Error: Error: unable to intercept function at 0x7cfcc4610380; please file a bug at F: _lcc00
    2023-01-19 07:48:12 AM - root - 19 - DEBUG - Process(pid=360, name="android.hardware.drm@1.4-service.clearkey", parameters={})
    2023-01-19 07:48:13 AM - root - 19 - DEBUG - Process(pid=361, name="android.hardware.drm@1.4-service.widevine", parameters={})
    2023-01-19 07:48:14 AM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0x7c6e504d3000
    Error: Error: unable to intercept function at 0x7c6e506afea0; please file a bug at F: _lcc00
    Error: Error: unable to intercept function at 0x7c6e506c4400; please file a bug at F: _lcc46
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=362, name="android.hardware.gatekeeper@1.0-service.software", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=363, name="android.hardware.graphics.allocator@3.0-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=364, name="android.hardware.graphics.composer@2.3-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=365, name="android.hardware.health@2.1-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=366, name="android.hardware.media.c2@1.0-service-goldfish", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=367, name="android.hardware.neuralnetworks@1.3-service-sample-all", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=368, name="android.hardware.neuralnetworks@1.3-service-sample-float-fast", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=369, name="android.hardware.neuralnetworks@1.3-service-sample-float-slow", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=370, name="android.hardware.neuralnetworks@1.3-service-sample-minimal", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=371, name="android.hardware.neuralnetworks@1.3-service-sample-quant", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=372, name="android.hardware.power.stats@1.0-service.mock", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=373, name="android.hardware.sensors@2.1-service.multihal", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=374, name="android.hardware.thermal@2.0-service.mock", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=375, name="android.hardware.usb@1.0-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=376, name="android.hardware.wifi@1.0-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=377, name="android.hardware.identity-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=378, name="iptables-restore", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=379, name="android.hardware.lights-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=380, name="ip6tables-restore", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=381, name="android.hardware.power-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=384, name="android.hardware.rebootescrow-service.default", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=386, name="android.hardware.vibrator-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=388, name="audioserver", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=389, name="credstore", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=390, name="gpuservice", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=391, name="surfaceflinger", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=442, name="drmserver", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=445, name="traced_probes", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=447, name="traced", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=457, name="logcat", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=463, name="bt_vhci_forwarder", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=464, name="cameraserver", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=466, name="incidentd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=467, name="installd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=468, name="media.extractor", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=469, name="media.metrics", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=470, name="mediaserver", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=472, name="storaged", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=473, name="wificond", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=474, name="libgoldfish-rild", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=475, name="media.swcodec", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=483, name="mdnsd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=484, name="gatekeeperd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=486, name="android.hardware.biometrics.face@1.0-service.example", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=487, name="android.hardware.biometrics.fingerprint@2.1-service", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=489, name="llkd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=561, name="system_server", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=739, name="android.hardware.input.classifier@1.0-service.default", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=919, name="wpa_supplicant", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=928, name="com.android.bluetooth", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=941, name="com.android.systemui", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1033, name="adbd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1102, name="android.hardware.gnss@2.0-service.ranchu", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1111, name="webview_zygote", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1127, name="com.android.networkstack.process", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1161, name="com.android.se", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1182, name="SIM Toolkit", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1241, name="com.google.android.apps.nexuslauncher", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1326, name="com.google.android.gms.persistent", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1452, name="com.google.android.gms", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1569, name="com.google.android.inputmethod.latin", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1596, name="com.google.android.ext.services", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1717, name="com.google.process.gservices", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1746, name="com.google.android.providers.media.module", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1873, name="com.android.emulator.multidisplay", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=2387, name="com.google.android.googlequicksearchbox:search", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=2611, name="Google", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=2971, name="com.google.android.gms.unstable", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=6110, name="Messages", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=7166, name="Chrome", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=7236, name="com.android.chrome_zygote", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=7293, name="com.android.chrome:privileged_process0", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=9794, name="Photos", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=10664, name="com.android.chrome:sandboxed_process0:org.chromium.content.app.SandboxedProce", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=11894, name="com.google.android.partnersetup", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=12558, name="com.google.android.apps.wellbeing", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=12983, name="com.google.android.apps.messaging", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13031, name="YouTube Music", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13123, name="Calendar", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13222, name="Clock", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13255, name="Gmail", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13344, name="YouTube", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13518, name="com.android.providers.calendar", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13679, name="com.android.chrome:sandboxed_process0:org.chromium.content.app.SandboxedProce", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13730, name="com.google.process.gapps", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13812, name="frida-server-16.0.8-android-x86_64", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13815, name="logcat", parameters={})
    2023-01-19 07:48:16 AM - root - 25 - INFO - Hooks completed
    2023-01-19 07:49:34 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:49:34 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:49:43 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-01-19 07:49:43 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Initialize"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Initialize"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetNumberOfOpenSessions: 0"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetDeviceID",
        "payload": {
            "Status": "OEMCrypto_SUCCESS",
            "Length": 32,
            "DeviceId": "6d63776361616161716a674469526370744a4b4b54616a4e4e47754b58695a00"
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetDeviceID",
        "payload": {
            "Status": "OEMCrypto_ERROR_SHORT_BUFFER",
            "Length": 32,
            "DeviceId": ""
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "Replacing PrivacyMode"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "Replacing PrivacyMode"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMSupportedCertificates: OEMCrypto_Supports_RSA_2048bit"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "Replacing PrivacyMode"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 85 - ERROR - unable to process the message
    2023-01-19 07:50:06 AM - Helpers.Scanner - 86 - ERROR - {'type': 'error', 'description': 'Error: access violation accessing 0x3', 'stack': 'Error: access violation accessing 0x3\n    at <anonymous> (frida/runtime/core.js:141)\n    at readStdString (/script1.js:316)\n    at onLeave (/script1.js:361)', 'fileName': 'frida/runtime/core.js', 'lineNumber': 141, 'columnNumber': 1}
    2023-01-19 07:50:06 AM - Helpers.Scanner - 87 - ERROR - None
    Quote Quote  
  7. Microsoft Windows [Versión 10.0.22624.1391]
    (c) Microsoft Corporation. Todos los derechos reservados.

    C:\Users\Silvi\Documentos\Video Downloader\dumper-main>Python3 dump_keys.py
    2023-03-25 09:15:17 PM - root - 16 - INFO - Connected to Android Emulator 5554
    2023-03-25 09:15:17 PM - root - 17 - INFO - scanning all processes for the following libraries
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1295, name="init", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1296, name="init", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1299, name="ueventd", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1646, name="logd", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1647, name="servicemanager", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1648, name="hwservicemanager", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1649, name="vndservicemanager", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1657, name="vold", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1710, name="android.hardware.keymaster@3.0-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1722, name="apexd", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1745, name="netd", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1746, name="zygote", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1749, name="android.hidl.allocator@1.0-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1750, name="android.system.suspend@1.0-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1751, name="healthd", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1752, name="android.hardware.audio@2.0-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1753, name="android.hardware.broadcastradio@1.1-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1754, name="android.hardware.camera.provider@2.4-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1755, name="android.hardware.cas@1.1-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1756, name="android.hardware.configstore@1.1-service", parameters={})
    2023-03-25 09:15:17 PM - root - 19 - DEBUG - Process(pid=1757, name="android.hardware.drm@1.0-service", parameters={})
    2023-03-25 09:15:18 PM - Helpers.Scanner - 82 - INFO - Running libwvdrmengine.so at 0xf2202000
    2023-03-25 09:15:18 PM - root - 19 - DEBUG - Process(pid=1758, name="android.hardware.drm@1.2-service.clearkey", parameters={})
    2023-03-25 09:15:18 PM - root - 19 - DEBUG - Process(pid=1759, name="android.hardware.drm@1.2-service.widevine", parameters={})
    2023-03-25 09:15:19 PM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0xe885a000
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1760, name="android.hardware.gatekeeper@1.0-service", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1761, name="android.hardware.gnss@1.0-service", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1762, name="android.hardware.graphics.allocator@2.0-service", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1763, name="android.hardware.graphics.composer@2.1-service", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1764, name="android.hardware.health@2.0-service.goldfish", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1766, name="android.hardware.power@1.1-service.ranchu", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1768, name="android.hardware.sensors@1.0-service", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1769, name="android.hardware.thermal@2.0-service.mock", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1770, name="android.hardware.wifi@1.0-service", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1772, name="qemu-props", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1773, name="ashmemd", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1774, name="audioserver", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1775, name="gpuservice", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1776, name="lmkd", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1778, name="surfaceflinger", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1780, name="logcat", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1783, name="sh", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1785, name="adbd", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1798, name="createns", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1801, name="traced", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1802, name="traced_probes", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1805, name="cameraserver", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1806, name="drmserver", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1807, name="idmap2d", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1808, name="incidentd", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1809, name="installd", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1810, name="keystore", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1811, name="mdnsd", parameters={})
    2023-03-25 09:15:19 PM - root - 19 - DEBUG - Process(pid=1812, name="mediadrmserver", parameters={})
    2023-03-25 09:15:20 PM - Helpers.Scanner - 82 - INFO - Running libmediadrm.so at 0xe7442000
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1813, name="media.extractor", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1814, name="media.metrics", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1815, name="mediaserver", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1816, name="statsd", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1817, name="storaged", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1818, name="wificond", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1819, name="media.codec", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1820, name="rild", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1824, name="media.swcodec", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1825, name="gatekeeperd", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1826, name="tombstoned", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1829, name="android.hardware.biometrics.fingerprint@2.1-service", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1830, name="llkd", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1842, name="iptables-restore", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1843, name="ip6tables-restore", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1888, name="netmgr", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1899, name="wifi_forwarder", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1909, name="dhcpclient", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=1916, name="hostapd_nohidl", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2013, name="system_server", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2178, name="wpa_supplicant", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2179, name="com.google.android.gms.persistent", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2201, name="com.android.systemui", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2439, name="com.google.android.networkstack", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2498, name="webview_zygote", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2578, name="com.android.phone", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2768, name="com.google.android.inputmethod.latin", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2809, name="com.google.android.apps.nexuslauncher", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=2865, name="com.google.android.ext.services", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=3032, name="com.android.se", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=3047, name="com.android.ims.rcsservice", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=3092, name="com.android.emulator.multidisplay", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=3186, name="com.google.process.gservices", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=3315, name="com.google.process.gapps", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=3690, name="com.android.smspush", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=4126, name="com.google.android.googlequicksearchboxearch", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=4682, name="com.google.android.ims", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=6294, name="Google", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=13332, name="android.process.acore", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=14197, name="com.google.android.gms", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=14379, name="Google Play Movies & TV", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=14858, name="android.process.media", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=15339, name="com.google.android.gms.unstable", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=15501, name="Chrome", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=15620, name="com.android.chromerivileged_process0", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=15791, name="com.android.chromeandboxed_process1rg.chromium.content.app.SandboxedPro", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=17141, name="Calendar", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=17154, name="com.android.providers.calendar", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=17206, name="Clock", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=17763, name="sh", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=17770, name="sh", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=17809, name="frida-server-16.0.11-android-x86", parameters={})
    2023-03-25 09:15:20 PM - root - 19 - DEBUG - Process(pid=17811, name="logcat", parameters={})
    2023-03-25 09:15:20 PM - root - 25 - INFO - Hooks completed
    2023-03-25 09:15:37 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:15:37 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_OEMCertificate"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 0,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 25600,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetDeviceID",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Length": 32,
    "DeviceId": "774b4d7056565656654b7168497450487579456c747648614 f46577153466300"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetDeviceID",
    "payload": {
    "Status": "OEMCrypto_ERROR_SHORT_BUFFER",
    "Length": 32,
    "DeviceId": ""
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_OEMCertificate"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 0,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 25600,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 0,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 25600,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_LoadDeviceRSAKey",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Session": 0,
    "Length": 1312,
    "Context": "d9cc7ec52b96cd152f303d21482a3e458ea0e1e0ade20d355 cc518d5801cadb3c759e6117e0fd0756dbf31253fc21e85364 4010d345d48044e7168fc078f2aabf9d08db53d318ad44736d c9045500b4fbb86e353bd4801a49538250d41c70d3ee79afc1 d5660bad5795c2dfbf5881508d88bed2d4648664979ed750f2 273f581c1b4ef0b25fd9b99618a8a3024fc1c9a8bd8ec3861f aedb4e06e36f5781b2e84d6ca71cbfddcf96bc7365abb37bfc ad5aac0ffe2d8de676ddc1f7d7be8e0761232fc549d4d526b0 395df5ddfe723ea7d83ce2e457726994093e7f2e1f8b044e1c 4633938b75c21309ef0fbfc9fda5f57af6ee3e4e8c4173899e e6cc6dbd09e32b81350fdefab0cc9911a77b844820e2cd3e6c 513ff52a3dd4607271800a099b57974c55d1ade544b41029b0 b40ac925147d84e8cf4d0f84e59f7ea8c3a54ea0c84e4b2b92 ba165bddf0f7b5cd3e65e0b59ca78aa0d491e6134464d92626 9de56f125b167fddf59c7348b0b76073c1672b7470ab07ca65 206b5b2861aa70e8feaf13a33eae9f2e857575cdb9b8028daf bb9e506d49dacb852c7b19fe26c53fd741032f3822c1dde624 c859bba4655d63b067067bd25ce7c95a3ea4f2b2efe63e122e c89ece33e7d3c2acdba953380c3b43f6b5272e7fd5806f3531 ff8badf65bf50891ccb857b536dd08821648ea5b8a2c5c2abd da15700a8ade011c2b4b8b3598c0b860db8cdf8bc628b12f64 0e032ebfc68b1b2f1259e408c9c1497c1180595ca70727161e a4f899146785c77108e8f40f46c06ebc3b2d536aa7a631891f e95401152e8dd5f466366b60e432ff1d2290c4db5a376f86e7 bcd0558f4e41f8e2b6839a24fe578860e16f22cda60571a8bc 2d128171fce9490c3e1331b8c9f6e0373243dc4b9121c86e06 e05eaff26caceb2c5e9c6102fccc00e0618b791f4ced90c1d3 e60e7e8edb181ee93e25c84943595ccd7bc0c99beba6864b18 178d8e86ed7e9c1c405cfb8ac0360ca3fe5a9e71a7e63e11a7 302de635ae9907c83a9b35d26b57ffd3a0da24806f3e9dbc69 83c0474b69912a100481b0dcba0733801bf27046b67edd7876 81793e7461e8b7a189087898184021c73db4b097437cd81e71 555d3b733245fb8622c673841fc036efaad4ad9c8cce71cdc7 30863c69455883140286137ee6cc39d7268c378cd24495926e b4758c8affb69e4f671422ced7b011eaa319581dcb7c2c66f2 2bfb5573d7576ed0597f0cced6048dffdaaa08bc6972f1f919 0ff298cce6a72a5dd269cc072d818403353a926ca892fd96e5 804989e0f7452c93bb66be147dec6e1a43d6700d5ec4fec34e a8f494ec42991a29cbcf1289932c90c111312443e8f0770965 44c255eca38cc6b82b8d3f84a933c7d8e63af5a0df40f7205c e310e93a3c8d5a33baba832815cb3dba5aba741a560c191c0d 060018db64615ac03bbf36ce3b1998b7c8be02ad66096516b7 57cebc8bcce1f29cd5186577bbdfa92addb3106bd068b1d087 3259c582711eddc3b8fe6d224620aa16807c3392b2e55ad7a7 2c3580d5fd2af4523e3823348de796b9b99834d38b85b6d878 dae2966a9186edcbd0900444ae1cb2a802762648fc25796693 1e18b4b2544a2967d7a047cf5e23116d4b294c03ad5a8bb487 495ca24303c2a61aaf6aed1001ca7453b6beeadd6a69fbec1e 7f4e99d0fa9a1c60925fc9de3af952f46dbdc2c66c4f38c3ee d05d4fdf1a908f626210d5fc716e851b08423fa107e739b6de 8e804e91a6d6286419552a2a08c8a7c4593b40f476ba591b91 e260c9c30b448c65a0ea7ebf7ae47582b83d363f9e089e333f c509f91d0882a61789c749256"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_LoadDeviceRSAKey",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Session": 25600,
    "Length": 1312,
    "Context": "d9cc7ec52b96cd152f303d21482a3e458ea0e1e0ade20d355 cc518d5801cadb3c759e6117e0fd0756dbf31253fc21e85364 4010d345d48044e7168fc078f2aabf9d08db53d318ad44736d c9045500b4fbb86e353bd4801a49538250d41c70d3ee79afc1 d5660bad5795c2dfbf5881508d88bed2d4648664979ed750f2 273f581c1b4ef0b25fd9b99618a8a3024fc1c9a8bd8ec3861f aedb4e06e36f5781b2e84d6ca71cbfddcf96bc7365abb37bfc ad5aac0ffe2d8de676ddc1f7d7be8e0761232fc549d4d526b0 395df5ddfe723ea7d83ce2e457726994093e7f2e1f8b044e1c 4633938b75c21309ef0fbfc9fda5f57af6ee3e4e8c4173899e e6cc6dbd09e32b81350fdefab0cc9911a77b844820e2cd3e6c 513ff52a3dd4607271800a099b57974c55d1ade544b41029b0 b40ac925147d84e8cf4d0f84e59f7ea8c3a54ea0c84e4b2b92 ba165bddf0f7b5cd3e65e0b59ca78aa0d491e6134464d92626 9de56f125b167fddf59c7348b0b76073c1672b7470ab07ca65 206b5b2861aa70e8feaf13a33eae9f2e857575cdb9b8028daf bb9e506d49dacb852c7b19fe26c53fd741032f3822c1dde624 c859bba4655d63b067067bd25ce7c95a3ea4f2b2efe63e122e c89ece33e7d3c2acdba953380c3b43f6b5272e7fd5806f3531 ff8badf65bf50891ccb857b536dd08821648ea5b8a2c5c2abd da15700a8ade011c2b4b8b3598c0b860db8cdf8bc628b12f64 0e032ebfc68b1b2f1259e408c9c1497c1180595ca70727161e a4f899146785c77108e8f40f46c06ebc3b2d536aa7a631891f e95401152e8dd5f466366b60e432ff1d2290c4db5a376f86e7 bcd0558f4e41f8e2b6839a24fe578860e16f22cda60571a8bc 2d128171fce9490c3e1331b8c9f6e0373243dc4b9121c86e06 e05eaff26caceb2c5e9c6102fccc00e0618b791f4ced90c1d3 e60e7e8edb181ee93e25c84943595ccd7bc0c99beba6864b18 178d8e86ed7e9c1c405cfb8ac0360ca3fe5a9e71a7e63e11a7 302de635ae9907c83a9b35d26b57ffd3a0da24806f3e9dbc69 83c0474b69912a100481b0dcba0733801bf27046b67edd7876 81793e7461e8b7a189087898184021c73db4b097437cd81e71 555d3b733245fb8622c673841fc036efaad4ad9c8cce71cdc7 30863c69455883140286137ee6cc39d7268c378cd24495926e b4758c8affb69e4f671422ced7b011eaa319581dcb7c2c66f2 2bfb5573d7576ed0597f0cced6048dffdaaa08bc6972f1f919 0ff298cce6a72a5dd269cc072d818403353a926ca892fd96e5 804989e0f7452c93bb66be147dec6e1a43d6700d5ec4fec34e a8f494ec42991a29cbcf1289932c90c111312443e8f0770965 44c255eca38cc6b82b8d3f84a933c7d8e63af5a0df40f7205c e310e93a3c8d5a33baba832815cb3dba5aba741a560c191c0d 060018db64615ac03bbf36ce3b1998b7c8be02ad66096516b7 57cebc8bcce1f29cd5186577bbdfa92addb3106bd068b1d087 3259c582711eddc3b8fe6d224620aa16807c3392b2e55ad7a7 2c3580d5fd2af4523e3823348de796b9b99834d38b85b6d878 dae2966a9186edcbd0900444ae1cb2a802762648fc25796693 1e18b4b2544a2967d7a047cf5e23116d4b294c03ad5a8bb487 495ca24303c2a61aaf6aed1001ca7453b6beeadd6a69fbec1e 7f4e99d0fa9a1c60925fc9de3af952f46dbdc2c66c4f38c3ee d05d4fdf1a908f626210d5fc716e851b08423fa107e739b6de 8e804e91a6d6286419552a2a08c8a7c4593b40f476ba591b91 e260c9c30b448c65a0ea7ebf7ae47582b83d363f9e089e333f c509f91d0882a61789c749256"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "Replacing PrivacyMode"
    }
    2023-03-25 09:15:40 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:21:27 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:21:27 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_OEMCertificate"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 0,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 25600,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetDeviceID",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Length": 32,
    "DeviceId": "774b4d7056565656654b7168497450487579456c747648614 f46577153466300"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetDeviceID",
    "payload": {
    "Status": "OEMCrypto_ERROR_SHORT_BUFFER",
    "Length": 32,
    "DeviceId": ""
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_IsInApp",
    "payload": {
    "in_app": true
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_OEMCertificate"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 0,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 25600,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22587 May 12 2021 23:47:58"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 0,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 25600,
    "Public_Cert_Length": 2388,
    "Cert": {}
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_LoadDeviceRSAKey",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Session": 0,
    "Length": 1312,
    "Context": "d9cc7ec52b96cd152f303d21482a3e458ea0e1e0ade20d355 cc518d5801cadb3c759e6117e0fd0756dbf31253fc21e85364 4010d345d48044e7168fc078f2aabf9d08db53d318ad44736d c9045500b4fbb86e353bd4801a49538250d41c70d3ee79afc1 d5660bad5795c2dfbf5881508d88bed2d4648664979ed750f2 273f581c1b4ef0b25fd9b99618a8a3024fc1c9a8bd8ec3861f aedb4e06e36f5781b2e84d6ca71cbfddcf96bc7365abb37bfc ad5aac0ffe2d8de676ddc1f7d7be8e0761232fc549d4d526b0 395df5ddfe723ea7d83ce2e457726994093e7f2e1f8b044e1c 4633938b75c21309ef0fbfc9fda5f57af6ee3e4e8c4173899e e6cc6dbd09e32b81350fdefab0cc9911a77b844820e2cd3e6c 513ff52a3dd4607271800a099b57974c55d1ade544b41029b0 b40ac925147d84e8cf4d0f84e59f7ea8c3a54ea0c84e4b2b92 ba165bddf0f7b5cd3e65e0b59ca78aa0d491e6134464d92626 9de56f125b167fddf59c7348b0b76073c1672b7470ab07ca65 206b5b2861aa70e8feaf13a33eae9f2e857575cdb9b8028daf bb9e506d49dacb852c7b19fe26c53fd741032f3822c1dde624 c859bba4655d63b067067bd25ce7c95a3ea4f2b2efe63e122e c89ece33e7d3c2acdba953380c3b43f6b5272e7fd5806f3531 ff8badf65bf50891ccb857b536dd08821648ea5b8a2c5c2abd da15700a8ade011c2b4b8b3598c0b860db8cdf8bc628b12f64 0e032ebfc68b1b2f1259e408c9c1497c1180595ca70727161e a4f899146785c77108e8f40f46c06ebc3b2d536aa7a631891f e95401152e8dd5f466366b60e432ff1d2290c4db5a376f86e7 bcd0558f4e41f8e2b6839a24fe578860e16f22cda60571a8bc 2d128171fce9490c3e1331b8c9f6e0373243dc4b9121c86e06 e05eaff26caceb2c5e9c6102fccc00e0618b791f4ced90c1d3 e60e7e8edb181ee93e25c84943595ccd7bc0c99beba6864b18 178d8e86ed7e9c1c405cfb8ac0360ca3fe5a9e71a7e63e11a7 302de635ae9907c83a9b35d26b57ffd3a0da24806f3e9dbc69 83c0474b69912a100481b0dcba0733801bf27046b67edd7876 81793e7461e8b7a189087898184021c73db4b097437cd81e71 555d3b733245fb8622c673841fc036efaad4ad9c8cce71cdc7 30863c69455883140286137ee6cc39d7268c378cd24495926e b4758c8affb69e4f671422ced7b011eaa319581dcb7c2c66f2 2bfb5573d7576ed0597f0cced6048dffdaaa08bc6972f1f919 0ff298cce6a72a5dd269cc072d818403353a926ca892fd96e5 804989e0f7452c93bb66be147dec6e1a43d6700d5ec4fec34e a8f494ec42991a29cbcf1289932c90c111312443e8f0770965 44c255eca38cc6b82b8d3f84a933c7d8e63af5a0df40f7205c e310e93a3c8d5a33baba832815cb3dba5aba741a560c191c0d 060018db64615ac03bbf36ce3b1998b7c8be02ad66096516b7 57cebc8bcce1f29cd5186577bbdfa92addb3106bd068b1d087 3259c582711eddc3b8fe6d224620aa16807c3392b2e55ad7a7 2c3580d5fd2af4523e3823348de796b9b99834d38b85b6d878 dae2966a9186edcbd0900444ae1cb2a802762648fc25796693 1e18b4b2544a2967d7a047cf5e23116d4b294c03ad5a8bb487 495ca24303c2a61aaf6aed1001ca7453b6beeadd6a69fbec1e 7f4e99d0fa9a1c60925fc9de3af952f46dbdc2c66c4f38c3ee d05d4fdf1a908f626210d5fc716e851b08423fa107e739b6de 8e804e91a6d6286419552a2a08c8a7c4593b40f476ba591b91 e260c9c30b448c65a0ea7ebf7ae47582b83d363f9e089e333f c509f91d0882a61789c749256"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "GetLevel3_LoadDeviceRSAKey",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Session": 25600,
    "Length": 1312,
    "Context": "d9cc7ec52b96cd152f303d21482a3e458ea0e1e0ade20d355 cc518d5801cadb3c759e6117e0fd0756dbf31253fc21e85364 4010d345d48044e7168fc078f2aabf9d08db53d318ad44736d c9045500b4fbb86e353bd4801a49538250d41c70d3ee79afc1 d5660bad5795c2dfbf5881508d88bed2d4648664979ed750f2 273f581c1b4ef0b25fd9b99618a8a3024fc1c9a8bd8ec3861f aedb4e06e36f5781b2e84d6ca71cbfddcf96bc7365abb37bfc ad5aac0ffe2d8de676ddc1f7d7be8e0761232fc549d4d526b0 395df5ddfe723ea7d83ce2e457726994093e7f2e1f8b044e1c 4633938b75c21309ef0fbfc9fda5f57af6ee3e4e8c4173899e e6cc6dbd09e32b81350fdefab0cc9911a77b844820e2cd3e6c 513ff52a3dd4607271800a099b57974c55d1ade544b41029b0 b40ac925147d84e8cf4d0f84e59f7ea8c3a54ea0c84e4b2b92 ba165bddf0f7b5cd3e65e0b59ca78aa0d491e6134464d92626 9de56f125b167fddf59c7348b0b76073c1672b7470ab07ca65 206b5b2861aa70e8feaf13a33eae9f2e857575cdb9b8028daf bb9e506d49dacb852c7b19fe26c53fd741032f3822c1dde624 c859bba4655d63b067067bd25ce7c95a3ea4f2b2efe63e122e c89ece33e7d3c2acdba953380c3b43f6b5272e7fd5806f3531 ff8badf65bf50891ccb857b536dd08821648ea5b8a2c5c2abd da15700a8ade011c2b4b8b3598c0b860db8cdf8bc628b12f64 0e032ebfc68b1b2f1259e408c9c1497c1180595ca70727161e a4f899146785c77108e8f40f46c06ebc3b2d536aa7a631891f e95401152e8dd5f466366b60e432ff1d2290c4db5a376f86e7 bcd0558f4e41f8e2b6839a24fe578860e16f22cda60571a8bc 2d128171fce9490c3e1331b8c9f6e0373243dc4b9121c86e06 e05eaff26caceb2c5e9c6102fccc00e0618b791f4ced90c1d3 e60e7e8edb181ee93e25c84943595ccd7bc0c99beba6864b18 178d8e86ed7e9c1c405cfb8ac0360ca3fe5a9e71a7e63e11a7 302de635ae9907c83a9b35d26b57ffd3a0da24806f3e9dbc69 83c0474b69912a100481b0dcba0733801bf27046b67edd7876 81793e7461e8b7a189087898184021c73db4b097437cd81e71 555d3b733245fb8622c673841fc036efaad4ad9c8cce71cdc7 30863c69455883140286137ee6cc39d7268c378cd24495926e b4758c8affb69e4f671422ced7b011eaa319581dcb7c2c66f2 2bfb5573d7576ed0597f0cced6048dffdaaa08bc6972f1f919 0ff298cce6a72a5dd269cc072d818403353a926ca892fd96e5 804989e0f7452c93bb66be147dec6e1a43d6700d5ec4fec34e a8f494ec42991a29cbcf1289932c90c111312443e8f0770965 44c255eca38cc6b82b8d3f84a933c7d8e63af5a0df40f7205c e310e93a3c8d5a33baba832815cb3dba5aba741a560c191c0d 060018db64615ac03bbf36ce3b1998b7c8be02ad66096516b7 57cebc8bcce1f29cd5186577bbdfa92addb3106bd068b1d087 3259c582711eddc3b8fe6d224620aa16807c3392b2e55ad7a7 2c3580d5fd2af4523e3823348de796b9b99834d38b85b6d878 dae2966a9186edcbd0900444ae1cb2a802762648fc25796693 1e18b4b2544a2967d7a047cf5e23116d4b294c03ad5a8bb487 495ca24303c2a61aaf6aed1001ca7453b6beeadd6a69fbec1e 7f4e99d0fa9a1c60925fc9de3af952f46dbdc2c66c4f38c3ee d05d4fdf1a908f626210d5fc716e851b08423fa107e739b6de 8e804e91a6d6286419552a2a08c8a7c4593b40f476ba591b91 e260c9c30b448c65a0ea7ebf7ae47582b83d363f9e089e333f c509f91d0882a61789c749256"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "Replacing PrivacyMode"
    }
    2023-03-25 09:21:30 PM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.2-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    Here is all the info. No error as you can see, maybe the dump folder is elsewhere, but i cant find it.

    Edit: Sorry i sent other two messages before this, I did not know that they had to be reviewed, if it has images. My problem is the dump folder doesnt appear, and i can't get the last two files the device_client_id_blob and device_private_key.
    I dont know what to do, please help.

    Thanks.
    Last edited by cartman123; 26th Mar 2023 at 08:35.
    Quote Quote  
  8. Originally Posted by HomeStarRunnerTron View Post
    Just wanted to mention to anyone who might find this who's an M1 Mac user-- I don't think there's a way for M1 Macs to properly do this tutorial, due to an inability of accessing the x86 version of Android. The ARM Google APIs version of Android currently does not have Chrome, and isn't capable of correctly running Widevine on the built-in WebTest browser. Maybe in the future, it'll work. I got a friend with a 64-bit Linux computer to do this. It was capable of running the exact x86 version of Android Pie with Chrome in it, and everything worked just as said!
    It works with M1 provided you are using an arm android image and arm frida build. I'm sharing an all-in-one dumper script for macOS (M1/M2) and Ubuntu: https://pastebin.com/LjmQnrV5
    Quote Quote  
  9. So, you get a "real" CDM from a "virtual" device and "the big brother" takes the bait. Very interesting

    All those sticky threads... %100 pure brainstorming.
    Quote Quote  
  10. Member
    Join Date
    Dec 2021
    Location
    Cote D'ivoire
    Search PM
    Hi. Did you solve the problem?

    Originally Posted by RafiV View Post
    I have the same error in my terminal output:

    2023-03-23 06:58:56 PM - Helpers.Scanner - 85 - ERROR - unable to process the message
    2023-03-23 06:58:56 PM - Helpers.Scanner - 86 - ERROR - {'type': 'error', 'description': 'Error: access violation accessing 0x3', 'stack': 'Error: access violation accessing 0x3\n at <anonymous> (frida/runtime/core.js:141)\n at readStdString (/script1.js:316)\n at onLeave (/script1.js:361)', 'fileName': 'frida/runtime/core.js', 'lineNumber': 141, 'columnNumber': 1}
    2023-03-23 06:58:56 PM - Helpers.Scanner - 87 - ERROR - None

    What can I do / did you do to solve this?


    Originally Posted by counterfactual View Post
    Originally Posted by cedric8528 View Post


    Let's have a look in dumper-main directory.

    You will find a directory (private-keys) containing the 2 files

    Image
    [Attachment 68358 - Click to enlarge]



    you just have to rename the 2 files respectively in :
    device_client_id_blob
    device_private_key
    Cedric, thanks for this great post. I have followed all the instructions, and amended them slightly for use on a Mac.
    One thing to note is that it can be difficult to get the adb shell to run as root. However, this can be overcome by selecting an emulated device which does not have the Play Store, and then using the command
    Code:
    adb -s emulator-5554 root
    Obviously replacing emulator-5554 with the one for your actual device.

    After installing frida and starting the server locally, I start the dump-keys.py application. It starts well, and appears to recognize when I go to a DRM encrypted site, but then it does not produce any output (like those two files you mention). It does display one error
    Code:
    2023-01-19 07:50:06 AM - Helpers.Scanner - 85 - ERROR - unable to process the message
    2023-01-19 07:50:06 AM - Helpers.Scanner - 86 - ERROR - {'type': 'error', 'description': 'Error: access violation accessing 0x3', 'stack': 'Error: access violation accessing 0x3\n    at <anonymous> (frida/runtime/core.js:141)\n    at readStdString (/script1.js:316)\n    at onLeave (/script1.js:361)', 'fileName': 'frida/runtime/core.js', 'lineNumber': 141, 'columnNumber': 1}
    2023-01-19 07:50:06 AM - Helpers.Scanner - 87 - ERROR - None
    But I do not see where it is going wrong. Did you select a device that has Google Play Store? I can't think why this would be necessary, but I am running out of ideas.

    Here's the full output from terminal:
    Code:
    dumper git:(main) ✗ python3 dump_keys.py
    2023-01-19 07:48:00 AM - root - 16 - INFO - Connected to Android Emulator 5554
    2023-01-19 07:48:00 AM - root - 17 - INFO - scanning all processes for the following libraries
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=170, name="init", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=172, name="ueventd", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=192, name="logd", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=193, name="lmkd", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=194, name="servicemanager", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=195, name="hwservicemanager", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=196, name="sh", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=201, name="qemu-props", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=204, name="vold", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=210, name="android.system.suspend@1.0-service", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=211, name="keystore2", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=212, name="android.hardware.atrace@1.0-service", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=213, name="android.hardware.keymaster@4.1-service", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=256, name="tombstoned", parameters={})
    2023-01-19 07:48:09 AM - root - 19 - DEBUG - Process(pid=338, name="dhcpclient", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=345, name="statsd", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=346, name="netd", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=347, name="zygote64", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=351, name="android.hidl.allocator@1.0-service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=352, name="android.hardware.audio.service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=353, name="android.hardware.authsecret@1.0-service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=354, name="android.hardware.bluetooth@1.1-service.btlinux", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=355, name="android.hardware.camera.provider@2.4-service_64", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=356, name="android.hardware.camera.provider@2.7-service-google", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=357, name="android.hardware.cas@1.2-service", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=358, name="android.hardware.contexthub@1.1-service.mock", parameters={})
    2023-01-19 07:48:10 AM - root - 19 - DEBUG - Process(pid=359, name="android.hardware.drm@1.0-service", parameters={})
    2023-01-19 07:48:12 AM - Helpers.Scanner - 82 - INFO - Running libwvdrmengine.so at 0x7cfcc447f000
    Error: Error: unable to intercept function at 0x7cfcc46248e0; please file a bug at F: _lcc46
    Error: Error: unable to intercept function at 0x7cfcc4610380; please file a bug at F: _lcc00
    2023-01-19 07:48:12 AM - root - 19 - DEBUG - Process(pid=360, name="android.hardware.drm@1.4-service.clearkey", parameters={})
    2023-01-19 07:48:13 AM - root - 19 - DEBUG - Process(pid=361, name="android.hardware.drm@1.4-service.widevine", parameters={})
    2023-01-19 07:48:14 AM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0x7c6e504d3000
    Error: Error: unable to intercept function at 0x7c6e506afea0; please file a bug at F: _lcc00
    Error: Error: unable to intercept function at 0x7c6e506c4400; please file a bug at F: _lcc46
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=362, name="android.hardware.gatekeeper@1.0-service.software", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=363, name="android.hardware.graphics.allocator@3.0-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=364, name="android.hardware.graphics.composer@2.3-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=365, name="android.hardware.health@2.1-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=366, name="android.hardware.media.c2@1.0-service-goldfish", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=367, name="android.hardware.neuralnetworks@1.3-service-sample-all", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=368, name="android.hardware.neuralnetworks@1.3-service-sample-float-fast", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=369, name="android.hardware.neuralnetworks@1.3-service-sample-float-slow", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=370, name="android.hardware.neuralnetworks@1.3-service-sample-minimal", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=371, name="android.hardware.neuralnetworks@1.3-service-sample-quant", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=372, name="android.hardware.power.stats@1.0-service.mock", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=373, name="android.hardware.sensors@2.1-service.multihal", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=374, name="android.hardware.thermal@2.0-service.mock", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=375, name="android.hardware.usb@1.0-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=376, name="android.hardware.wifi@1.0-service", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=377, name="android.hardware.identity-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=378, name="iptables-restore", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=379, name="android.hardware.lights-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=380, name="ip6tables-restore", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=381, name="android.hardware.power-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=384, name="android.hardware.rebootescrow-service.default", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=386, name="android.hardware.vibrator-service.example", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=388, name="audioserver", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=389, name="credstore", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=390, name="gpuservice", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=391, name="surfaceflinger", parameters={})
    2023-01-19 07:48:15 AM - root - 19 - DEBUG - Process(pid=442, name="drmserver", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=445, name="traced_probes", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=447, name="traced", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=457, name="logcat", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=463, name="bt_vhci_forwarder", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=464, name="cameraserver", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=466, name="incidentd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=467, name="installd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=468, name="media.extractor", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=469, name="media.metrics", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=470, name="mediaserver", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=472, name="storaged", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=473, name="wificond", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=474, name="libgoldfish-rild", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=475, name="media.swcodec", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=483, name="mdnsd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=484, name="gatekeeperd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=486, name="android.hardware.biometrics.face@1.0-service.example", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=487, name="android.hardware.biometrics.fingerprint@2.1-service", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=489, name="llkd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=561, name="system_server", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=739, name="android.hardware.input.classifier@1.0-service.default", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=919, name="wpa_supplicant", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=928, name="com.android.bluetooth", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=941, name="com.android.systemui", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1033, name="adbd", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1102, name="android.hardware.gnss@2.0-service.ranchu", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1111, name="webview_zygote", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1127, name="com.android.networkstack.process", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1161, name="com.android.se", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1182, name="SIM Toolkit", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1241, name="com.google.android.apps.nexuslauncher", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1326, name="com.google.android.gms.persistent", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1452, name="com.google.android.gms", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1569, name="com.google.android.inputmethod.latin", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1596, name="com.google.android.ext.services", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1717, name="com.google.process.gservices", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1746, name="com.google.android.providers.media.module", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=1873, name="com.android.emulator.multidisplay", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=2387, name="com.google.android.googlequicksearchbox:search", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=2611, name="Google", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=2971, name="com.google.android.gms.unstable", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=6110, name="Messages", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=7166, name="Chrome", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=7236, name="com.android.chrome_zygote", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=7293, name="com.android.chrome:privileged_process0", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=9794, name="Photos", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=10664, name="com.android.chrome:sandboxed_process0:org.chromium.content.app.SandboxedProce", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=11894, name="com.google.android.partnersetup", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=12558, name="com.google.android.apps.wellbeing", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=12983, name="com.google.android.apps.messaging", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13031, name="YouTube Music", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13123, name="Calendar", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13222, name="Clock", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13255, name="Gmail", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13344, name="YouTube", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13518, name="com.android.providers.calendar", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13679, name="com.android.chrome:sandboxed_process0:org.chromium.content.app.SandboxedProce", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13730, name="com.google.process.gapps", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13812, name="frida-server-16.0.8-android-x86_64", parameters={})
    2023-01-19 07:48:16 AM - root - 19 - DEBUG - Process(pid=13815, name="logcat", parameters={})
    2023-01-19 07:48:16 AM - root - 25 - INFO - Hooks completed
    2023-01-19 07:49:34 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:49:34 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:49:43 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-01-19 07:49:43 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Initialize"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_Initialize"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetNumberOfOpenSessions: 0"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetDeviceID",
        "payload": {
            "Status": "OEMCrypto_SUCCESS",
            "Length": 32,
            "DeviceId": "6d63776361616161716a674469526370744a4b4b54616a4e4e47754b58695a00"
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetDeviceID",
        "payload": {
            "Status": "OEMCrypto_ERROR_SHORT_BUFFER",
            "Length": 32,
            "DeviceId": ""
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:04 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "Replacing PrivacyMode"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_GetProvisioningMethod",
        "payload": {
            "Method": "OEMCrypto_OEMCertificate"
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "Replacing PrivacyMode"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22596 May 28 2021 16:59:00"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMCryptoVersion",
        "payload": {
            "Version": 16
        }
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "OEMSupportedCertificates: OEMCrypto_Supports_RSA_2048bit"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 78 - DEBUG - {
        "from": "android.hardware.drm@1.4-service.widevine",
        "message": "Replacing PrivacyMode"
    }
    2023-01-19 07:50:06 AM - Helpers.Scanner - 85 - ERROR - unable to process the message
    2023-01-19 07:50:06 AM - Helpers.Scanner - 86 - ERROR - {'type': 'error', 'description': 'Error: access violation accessing 0x3', 'stack': 'Error: access violation accessing 0x3\n    at <anonymous> (frida/runtime/core.js:141)\n    at readStdString (/script1.js:316)\n    at onLeave (/script1.js:361)', 'fileName': 'frida/runtime/core.js', 'lineNumber': 141, 'columnNumber': 1}
    2023-01-19 07:50:06 AM - Helpers.Scanner - 87 - ERROR - None
    Quote Quote  
  11. After some hassle getting Android Studio to work on Monterey (I had to download the latest release as a zip not a DMG), this worked for me. Thanks, and respect!!
    Quote Quote  
  12. Member
    Join Date
    Jul 2022
    Location
    Ecuador
    Search PM
    I have a mobile with widevine L1, how do I get the cmd... I followed the same steps that are used for L3, but I had no luck
    Quote Quote  
  13. Hello, after trying a few times now, I get this error all the time

    https://imgur.com/a/tFZHbaJ

    Sorry if it's a dumb question, I'm a beginner
    Quote Quote  
  14. Thanks for the guide, succeeded to dump Android 9 CDM, but while using it with license server it returns 2042 Update system or browser. For system above Android 9 it is not dumping CDM, any tips?
    Quote Quote  
  15. 2023-04-10 06:14:43 AM - root - 16 - INFO - Connected to Android Emulator 5554
    2023-04-10 06:14:43 AM - root - 17 - INFO - scanning all processes for the following libraries
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=146, name="init", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=148, name="ueventd", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=175, name="logd", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=176, name="lmkd", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=177, name="servicemanager", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=179, name="hwservicemanager", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=184, name="sh", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=185, name="qemu-props", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=188, name="vold", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=196, name="android.hardware.keymaster@4.1-service", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=222, name="android.system.suspend@1.0-service", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=223, name="android.hardware.atrace@1.0-service", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=291, name="createns", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=296, name="tombstoned", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=301, name="statsd", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=302, name="netd", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=303, name="zygote64", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=304, name="zygote", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=305, name="android.hidl.allocator@1.0-service", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=306, name="android.hardware.audio.service.ranchu", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=307, name="android.hardware.authsecret@1.0-service", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=308, name="android.hardware.bluetooth@1.1-service.sim", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=309, name="android.hardware.camera.provider@2.4-service", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=310, name="android.hardware.camera.provider@2.6-service-google", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=311, name="android.hardware.cas@1.2-service", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=315, name="android.hardware.contexthub@1.1-service.mock", parameters={})
    2023-04-10 06:14:43 AM - root - 19 - DEBUG - Process(pid=316, name="android.hardware.drm@1.0-service", parameters={})
    2023-04-10 06:14:44 AM - Helpers.Scanner - 82 - INFO - Running libwvdrmengine.so at 0x72b310c42000
    Error: Error: unable to intercept function at 0x72b310dd0390; please file a bug at F: _lcc00
    Error: Error: unable to intercept function at 0x72b310de3e30; please file a bug at F: _lcc46
    2023-04-10 06:14:44 AM - root - 19 - DEBUG - Process(pid=317, name="android.hardware.drm@1.3-service.clearkey", parameters={})
    2023-04-10 06:14:45 AM - root - 19 - DEBUG - Process(pid=318, name="android.hardware.drm@1.3-service.widevine", parameters={})
    2023-04-10 06:14:46 AM - Helpers.Scanner - 82 - INFO - Running libwvhidl.so at 0x7cc3c4047000
    Error: Error: unable to intercept function at 0x7cc3c41fd050; please file a bug at F: _lcc00
    Error: Error: unable to intercept function at 0x7cc3c4210af0; please file a bug at F: _lcc46
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=319, name="android.hardware.gatekeeper@1.0-service.software", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=320, name="android.hardware.graphics.allocator@3.0-service", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=321, name="android.hardware.graphics.composer@2.3-service", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=322, name="android.hardware.health@2.1-service", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=323, name="android.hardware.neuralnetworks@1.3-service-sample-all", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=324, name="android.hardware.neuralnetworks@1.3-service-sample-float-fast", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=325, name="iptables-restore", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=326, name="ip6tables-restore", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=327, name="android.hardware.neuralnetworks@1.3-service-sample-float-slow", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=329, name="android.hardware.neuralnetworks@1.3-service-sample-minimal", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=330, name="android.hardware.neuralnetworks@1.3-service-sample-quant", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=331, name="android.hardware.power.stats@1.0-service.mock", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=332, name="android.hardware.sensors@2.1-service.multihal", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=339, name="android.hardware.thermal@2.0-service.mock", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=340, name="android.hardware.usb@1.0-service", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=342, name="android.hardware.wifi@1.0-service", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=347, name="android.hardware.identity-service.example", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=349, name="android.hardware.lights-service.example", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=350, name="android.hardware.power-service.example", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=351, name="android.hardware.rebootescrow-service.default", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=356, name="android.hardware.vibrator-service.example", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=359, name="media.log", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=365, name="credstore", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=366, name="gpuservice", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=369, name="surfaceflinger", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=375, name="logcat", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=384, name="audioserver", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=391, name="adbd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=421, name="traced_probes", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=423, name="traced", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=427, name="cameraserver", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=435, name="drmserver", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=437, name="incidentd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=438, name="installd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=439, name="iorapd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=440, name="keystore", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=442, name="media.extractor", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=443, name="media.metrics", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=444, name="mediaserver", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=450, name="storaged", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=451, name="wificond", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=453, name="media.codec", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=456, name="libgoldfish-rild", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=460, name="media.swcodec", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=462, name="mdnsd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=464, name="gatekeeperd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=466, name="android.hardware.biometrics.face@1.0-service.example", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=468, name="android.hardware.biometrics.fingerprint@2.1-service", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=473, name="llkd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=500, name="netmgr", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=510, name="wifi_forwarder", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=522, name="dhcpclient", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=539, name="hostapd_nohidl", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=611, name="system_server", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=747, name="iorap.prefetcherd", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=773, name="android.hardware.input.classifier@1.0-service.default", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=919, name="wpa_supplicant", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=926, name="com.android.bluetooth", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=947, name="com.android.systemui", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1186, name="android.hardware.gnss@2.0-service.ranchu", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1202, name="com.google.android.apps.nexuslauncher", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1210, name="webview_zygote", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1251, name="com.android.networkstack.process", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1296, name="com.android.se", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1327, name="com.android.phone", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1428, name="com.google.android.gms.persistent", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1626, name="com.google.android.ext.services", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1684, name="com.google.android.inputmethod.latin", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1697, name="com.google.android.gms", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1961, name="com.google.process.gservices", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=1971, name="com.google.android.providers.media.module", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=2005, name="Google", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=2062, name="com.android.ims.rcsservice", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=2097, name="com.android.emulator.multidisplay", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=2226, name="com.google.process.gapps", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=2450, name="Phone", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=2718, name="Messages", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=3305, name="com.google.android.gms.unstable", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=3964, name="com.google.android.ims", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=4212, name="abb", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=5527, name="com.google.android.permissioncontroller", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=7739, name="com.apkpure.aegon", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=7806, name="APKPure", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=7816, name="com.google.android.webviewandboxed_process0rg.chromium.content.app.SandboxedProcessService0:0 ", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=7924, name="Photos", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=8247, name="android.process.acore", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=8298, name="com.google.android.apps.wellbeing", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=8382, name="apni pathshala", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=8541, name="com.google.android.gms.ui", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=9160, name="com.google.android.projection.gearheadhared", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=9763, name="com.google.android.configupdater", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=9899, name="sh", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=9901, name="sh", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=9904, name="frida-server-16.0.11-android-x86_64", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=9906, name="logcat", parameters={})
    2023-04-10 06:14:46 AM - root - 19 - DEBUG - Process(pid=9924, name="frida-helper-32", parameters={})
    2023-04-10 06:14:46 AM - root - 25 - INFO - Hooks completed
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22592 May 12 2021 23:37:49"
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_Initialize"
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_OEMCertificate"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 1,
    "Public_Cert_Length": 2396,
    "Cert": {}
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_GetDeviceID",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Length": 32,
    "DeviceId": "6d504465565656566d72494d6d4e4c497a554d4c664b73667 b494c6365736500"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_GetDeviceID",
    "payload": {
    "Status": "OEMCrypto_ERROR_SHORT_BUFFER",
    "Length": 32,
    "DeviceId": ""
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 60 - DEBUG - processing device id
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_GetProvisioningMethod",
    "payload": {
    "Method": "OEMCrypto_OEMCertificate"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 1,
    "Public_Cert_Length": 2396,
    "Cert": {}
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCryptoVersion",
    "payload": {
    "Version": 15
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_BuildInformation: OEMCrypto Level3 Code 22592 May 12 2021 23:37:49"
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Status": "OEMCrypto_SUCCESS"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "GetLevel3_GetOEMPublicCertificate",
    "payload": {
    "Session": 1,
    "Public_Cert_Length": 2396,
    "Cert": {}
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "GetLevel3_LoadDeviceRSAKey",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Session": 0,
    "Length": 1312,
    "Context": "9210c323cf7139c5058ad22838a5e8f1ab6b1557b54c89f38 871f748473885dea1e6763ec62c94b176e4adbbb6adb4ae354 04aa15da5f140acf8c856efc344f161ae0696b0dea720ca4ff 1630bec6a15d082ca408ac049c79e3e282862dc15b02abacd7 b5e086e4fc90674e4bd511bf8aae69c328ca63759e7e779db0 73fa411c68fd35af8e5c4f769995af283f2223dac29db40857 8174686067941fb126b5bcb6ff3d41c91f375460bcfd11c71e 16295062155217fc44823e845ed029882a60ec5dcfd80b4695 a34c9ffe1c41f2ac76bbf562c73e9b7b3226726635bb98afa3 73c2fc1b8ce502f5310e1f44f67a62ef80cf55f1287441493d 36af63d30d97f65484a23f60dcca7322d8ca3b83bcc1cf62c3 16a82075d3ccfa58c6ab9bb786bac549a46e9475fd82772378 4195b0a3fadb22e1fe20474d37bec0c3741a2cfae03f1262fb f1ec4d2f1abbb3ddef57b8040603436803326aaa1eeaff9005 137ceff2b267cdfdacdb9e0bf12b67b6b1b1f2a4b64969b79e 99699fcbab16620b62d43128e199758f5011612b6fa0c924fd ba236a79fea92759f6dcb3d98caa2aacd106594007b5732e9a cd3f4f3b5fc2808c34c4e2d4a358899f7b9744fef5cf320573 24163c928d0c0b188cbf3b48fcd40510b2e24dd38f3cfd32e0 2b40dd6c8ac3002519c6e4b213d479eeb0a49494947b894b08 4786f60146512e18c7b3eceafbb17588c4e22e130597c29f3f bb240957d0040118469803902a3f1ae27b496b5674916b8991 b6568dbf7481a3ce07da2b6d88faca1726cb0ce71b8a2f47c1 ccc058993e3a54808ae0eaae9ae990e07a8f1d073106b6609e 21538c4faddd137704dd9341be0fc25fda210c445fe70f1e6f f3b82dc33940b9637e5d6c139fb15c3a33be75184eca68aa39 cf5b7f3a7a2dcc1a4831a4536e397a2d00c7daa487df88e699 64bb5b20a37ada11835bae6460e1027a31d5fbf0fa4d33cffc 3a99acdf610d46f4eebb71aad2339e36bf9daac7d0f2e170e4 c4b72a7f66a03eeba6c38274211b6b6948dcda74f5600880bd cfa51ea42bfda00fe0ca8ec625555e76b446af5073218061c9 a091f8463ace61b32b7a90c46b2a20bb12165511017d37a562 8f7be5c4314b352155715b33cf7d547bdaba3d5474c4eb6b95 ce9c8ceab025c9e8db2f814fb26e210c6eb2ad68a546cb46da a3d24f1ba6179ffbec061fc7bb1b75c595fa40ad87e65a62d4 a9cdb0796a123d2f7d760eb07e623429770bf5ab5e37aeb274 3fbaf0574bb0c5647e45ae0f1aeb865320c06a1c6a1054521e 2926f3df639c811b6bafd2e788760d05608b1fb2477b0c2e55 18c9ced3a05ea9c24f934c9000fa632395bcd5d5aedaf089e0 0c688bd7731d0438ce0bbb231e2408033b75833e5f33e3323b 1b1bdb7eb2bac4b01db3ed8d9161c51e06a8cea47437f08940 71eae4ba95fd1a35d8d5fe6578af3b3d0400ccdfba79dcf659 acefae1e346712479045aca43a06d08cef4265544b09f19e40 89d5bdd7a41340cc7c0b885029535c1871319a4d71bb62f672 12aaf71db0df9ae8b8cc7fb926ea146259416d26b1be84dc60 2633374387e5c57287889ad8e00ceb35101bac172ac2f730ac 9d826a2843c40a61febf3c73786d055e63a8ca1d93fc301475 9f228282e9b6db854ef2e32967d97b60a868f97c94f75a4beb b06501606ce436b8081e1837e62c906f99de02e8a169eab490 cd8c53ec3c7476cafc99e26b84bd9183ad884dae4354b0e0d9 5333a2cbf22f873d17efdace05ee269bc59623e8f445f7e9a0 0e3caf9a18d6e2fee58ccc486d8df8c0098ce09229edd257a5 c7d8ef4d15c50494e105dae1f"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMSecurityLevel",
    "payload": {
    "Level": "L3"
    }
    }
    2023-04-10 06:14:51 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "Replacing PrivacyMode"
    }
    2023-04-10 06:14:52 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_LoadKeys",
    "payload": {
    "Status": "OEMCrypto_SUCCESS",
    "Type": "OEMCrypto_ContentLicense",
    "Message": "0a540a2043304630373938434337343834453541303730303 03030303030303030303030122043304630373938434337343 834453541303730303030303030303030303030301a0020022 8003800400048c1b0cda106120c08011001180020002800300 01a66121087ee533d3df6dfd56174ee6fe2970cb51a5060771 3d9fd3dca61ff66567d094eb3de523a475d50532fad53c6460 1b2760811203d201ef2c7fc6756b66b5c032d63a221e544de0 c189f2436af291a7981d142ba0d41456d0262b9542eda63e06 b68ae20011a84010a10d43ca6e125d64157815ef956e5df202 81210b92402cfbb0941b12c8aee691bc16dc51a204018f5603 f6a02162f3a3bdf962ccb278572a2f8fa19e84f7c3cb5f598d c0b7d2002280142340a20bebc8bb1eda719a778879884490ef 17fce24c2c80ace79e88773901564983bfe121091f30761b8a 7660b838c9abd75e29b0e6202534420c1b0cda10638e3dc959 b06",
    "Signature": "b4bd675246f3857e5cfb54aeb7510c8526ee879976b581033 31b314d30b03c5a"
    }
    }
    2023-04-10 06:14:56 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }
    2023-04-10 06:14:56 AM - Helpers.Scanner - 75 - DEBUG - {
    "from": "android.hardware.drm@1.3-service.widevine",
    "message": "OEMCrypto_Terminate_Status: OEMCrypto_SUCCESS"
    }



    There is no problem in dumping but i am not getting the key folder
    I tried changing android version and emulator version too nevertheless problem persists any Idea ?
    Quote Quote  
  16. Member
    Join Date
    Jan 2022
    Location
    Wales
    Search Comp PM
    Hi,
    Did you tried Pixel 6 and Android 9 version? I had the same issue when using Android 10 or 11, as there was no google chrome installed.

    Thx
    Cez
    Quote Quote  
  17. Member
    Join Date
    Jan 2022
    Location
    Wales
    Search Comp PM
    Originally Posted by magicdl View Post
    I tried with udemy but not working. I have PSSH and License url.
    PSSH: AAAAMnBzc2gAAAAA7e+LqXnWSs6jyCfc1R0h7QAAABISEDCAkN J2pkMpueHBPw2AlwI=
    License URL: https://www.udemy.com/api-2.0/media-license-server/validate-auth-token?drm_type=widevi...lA4f4pQ-9oCghg

    Error this:
    C:\Users\admin\Desktop\WKS-Keys-main\wks-keys\pywidevine\L3\cdm\cdm.py:260: RuntimeWarning: Unexpected end-group tag: Not all data was converted
    license.ParseFromString(base64.b64decode(license_b 64))
    Traceback (most recent call last):
    File "C:\Users\admin\Desktop\WKS-Keys-main\wks-keys\l3.py", line 25, in <module>
    correct, keys = WV_Function(pssh, lic_url)
    File "C:\Users\admin\Desktop\WKS-Keys-main\wks-keys\l3.py", line 21, in WV_Function
    wvdecrypt.update_license(license_b64)
    File "C:\Users\admin\Desktop\WKS-Keys-main\wks-keys\pywidevine\L3\decrypt\wvdecryptcustom.py", line 58, in update_license
    self.cdm.provide_license(self.session, license_b64)
    File "C:\Users\admin\Desktop\WKS-Keys-main\wks-keys\pywidevine\L3\cdm\cdm.py", line 275, in provide_license
    session.session_key = oaep_cipher.decrypt(license.SessionKey)
    File "C:\Users\admin\AppData\Local\Programs\Python\Pyth on310\lib\site-packages\Cryptodome\Cipher\PKCS1_OAEP.py", line 167, in decrypt
    raise ValueError("Ciphertext with incorrect length.")
    ValueError: Ciphertext with incorrect length.

    Any can help me.

    Hi,
    I have the same issue. Did you solve it, please ?

    regards
    Cez
    Quote Quote  
  18. Member
    Join Date
    Apr 2023
    Location
    LONDON
    Search PM
    Hello, the installation and extraction works very well, thank you!

    Could you please tell me how to remove mpd link from some apk or website via browser?

    Because different mpd links are present depending on the browser or the apk.. thank you!
    Quote Quote  
  19. Use Android 9 instead of 11 or 13. Already tried and they won't work right. Switched to 9 and the instructions worked fine.

    Unable to get this to work.

    When running dump_keys.py, the last line I see is this (which I think is normal):
    Code:
    2023-04-19 07:26:10 PM - root - 25 - INFO - Hooks completed
    When I visited the DRM page, nothing happens in dump_keys.py (screenshot attached).

    The only thing I can think of trying next is running an android-x86 emulator instead of android-x86_64 but not sure if that would help.

    Update: Switching to an android-x86 emulator worked. I see lots of DEBUG text flying through, but I don't see any new folders or files in my dumper-main directory except for a license_request.bin file. Nothing else.
    Last edited by besweeet; 19th Apr 2023 at 21:14.
    Quote Quote  
  20. frida.PermissionDeniedError: unable to access process with pid 623 due to system restrictions; try `sudo sysctl kernel.yama.ptrace_scope=0`, or run Frida as root


    I am getting this issue
    Quote Quote  
  21. Don't forget to be root

    Code:
    adb shell
    su
    or

    Code:
    adb shell
    su -
    Try another version of Frida if the probleme persist.
    Quote Quote  
  22. Member
    Join Date
    Dec 2021
    Location
    Scotland
    Search Comp PM
    Well I thought I'd try Android Studio with my current Windows 10 setup last night (I hadn't got it installed at the time). Just to see how difficult it could be and whether I got any of the other readers' errors.

    I followed cedric's excellent thread and also the Magician's video https://streamable.com/f1ajvi

    Basically, it just worked.

    Python version: 3.10.1 (so not new, but not too old)
    pycryptodome 3.12.0
    pycryptodomex 3.12.0

    I can't see the need to upgrade them since they work with all my scripts.

    I don't have
    cryptography
    pycryto

    So they weren't needed.

    frida 16.0.18
    frida-tools 12.1.1
    so of course
    frida-server-16.0.18-android-x86 in platform_tools

    Android Studio does take an age to install. If Windows Defender kicks in tell it to accept it (I think it did with adb). I used exactly the same phone (Pixel 6) and Android OS (Pie) as cedric did. Now I've a reasonably fast PC, but it still took an age to get a virtual phone (after 30 minutes I just left it and went away for a walk). For those wondering if anything was happening, it counts up in whole minutes at bottom left.
    Unlike with cedric, a phone did not appear when that count-up had completed. So I followed Magician's video for a bit to get a phone image:
    In \\Sdk\emulator:
    emulator.exe -list-avds
    to list my phones
    emulator.exe -avd Pixel_6_API_28
    (where Pixel_6_API_28 is my phone from above list)

    And hey presto, I have a new virtual phone image.

    Oh, and yes, the keys do work.
    Quote Quote  
  23. Hi cedric8528, thanks for the great guide!

    I followed it through but when I play the video on "https://bitmovin.com/demos/drm" it does nothing. No keys appear in the folder.

    Do you have any idea about it? Thanks!
    Quote Quote  
  24. try another site with drm videos.
    Quote Quote  
  25. Hey guys,this great thread and your help.

    After installing Android Studio, Python, Frida, Frida tools (16.0.18) and Downloading frida Server (frida-server-16.0.18-android-x86), Pushing frida server to /sdcard, starting the server and running Python dump_keys.py, i get this message:

    C:\Users\Helona\AppData\Local\Android\Sdk\platform-tools\dumper-main>python dump_keys.py
    2023-04-26 09:34:55 PM - root - 16 - INFO - Connected to Android Emulator 5554
    2023-04-26 09:34:55 PM - root - 17 - INFO - scanning all processes for the following libraries
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=1, name="init", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=171, name="init", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=173, name="ueventd", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=215, name="logd", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=216, name="lmkd", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=217, name="servicemanager", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=218, name="hwservicemanager", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=223, name="sh", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=224, name="qemu-props", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=228, name="vold", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=237, name="android.system.suspend@1.0-service", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=238, name="keystore", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=239, name="android.hardware.atrace@1.0-service", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=240, name="android.hardware.security.keymint-service", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=277, name="tombstoned", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=360, name="dhcpclient", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=372, name="statsd", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=373, name="netd", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=374, name="zygote64", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=378, name="android.hidl.allocator@1.0-service", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=379, name="android.hardware.audio.service", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=380, name="android.hardware.authsecret@1.0-service", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=381, name="android.hardware.bluetooth@1.1-service.btlinux", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=382, name="android.hardware.camera.provider@2.4-service_64", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=383, name="android.hardware.camera.provider@2.7-service-google", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=384, name="android.hardware.cas@1.2-service", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=389, name="android.hardware.contexthub@1.1-service.mock", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=390, name="iptables-restore", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=391, name="ip6tables-restore", parameters={})
    2023-04-26 09:34:56 PM - root - 19 - DEBUG - Process(pid=393, name="android.hardware.drm-service.clearkey", parameters={})
    Traceback (most recent call last):
    File "C:\Users\Helona\AppData\Local\Android\Sdk\platfor m-tools\dumper-main\dump_keys.py", line 21, in <module>
    libraries = scanner.find_widevine_process(device, process.name)
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^
    File "C:\Users\Helona\AppData\Local\Android\Sdk\platfor m-tools\dumper-main\Helpers\Scanner.py", line 149, in find_widevine_process
    process = dev.attach(process_name)
    ^^^^^^^^^^^^^^^^^^^^^^^^
    File "C:\Users\Helona\AppData\Local\Packages\PythonSoft wareFoundation.Python.3.11_qbz5n2kfra8p0\LocalCach e\local-packages\Python311\site-packages\frida\core.py", line 86, in wrapper
    return f(*args, **kwargs)
    ^^^^^^^^^^^^^^^^^^
    File "C:\Users\Helona\AppData\Local\Packages\PythonSoft wareFoundation.Python.3.11_qbz5n2kfra8p0\LocalCach e\local-packages\Python311\site-packages\frida\core.py", line 1010, in attach
    return Session(self._impl.attach(self._pid_of(target), **kwargs)) # type: ignore
    ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
    frida.ServerNotRunningError: unable to connect to remote frida-server: closed

    the frida-server-16.0.18-android-x86 is located in C:\Users\Helona\AppData\Local\Android\Sdk\platform-tools,
    inside this directory, i got another directory 'dumper-main' with the 'dump_keys.py' and other files..........


    What am i doing wrong ? What should be the problem ?

    thanks !!!!
    Quote Quote  
  26. Originally Posted by randomvideodude View Post
    Originally Posted by HomeStarRunnerTron View Post
    Just wanted to mention to anyone who might find this who's an M1 Mac user-- I don't think there's a way for M1 Macs to properly do this tutorial, due to an inability of accessing the x86 version of Android. The ARM Google APIs version of Android currently does not have Chrome, and isn't capable of correctly running Widevine on the built-in WebTest browser. Maybe in the future, it'll work. I got a friend with a 64-bit Linux computer to do this. It was capable of running the exact x86 version of Android Pie with Chrome in it, and everything worked just as said!
    It works with M1 provided you are using an arm android image and arm frida build. I'm sharing an all-in-one dumper script for macOS (M1/M2) and Ubuntu: https://pastebin.com/LjmQnrV5
    I can confirm your all-in-one dumper script works on my M1 MacBook Pro running MacOS 13.3.1. Thanks a ton, randomvideodude!
    Quote Quote  
  27. Thank you for the tutorial, but it seems like I'm stuck at the final step. Although it says "Hooks completed", no new directory or files are generated after playing the video. Additionally, I noticed that the website says "Detected, using No DR". What should I do? Thank you for your response, as my English is not very good, this is a translation from chat.openai.
    Last edited by a01196; 22nd May 2023 at 11:50.
    Quote Quote  
  28. Originally Posted by a01196 View Post
    Thank you for the tutorial, but it seems like I'm stuck at the final step. Although it says "Hooks completed", no new directory or files are generated after playing the video. Additionally, I noticed that the website says "Detected, using No DR". What should I do? Thank you for your response, as my English is not very good, this is a translation from Google.
    Correction:
    It is now usable. Previously, I needed to switch Chrome to "Desktop site" in order for the option to ask me if I want to play the video to pop up. However, https://bitmovin.com/demos/drm still displays "NO DRM". I went to this website (https://www.theoplayer.com/theoplayer-drm-aes-128-encryption) to play the video and generate the two files. For computer novices experiencing the same issue, I hope this can be helpful: even after checking "Desktop site", the video still cannot be played and you need to go to Settings to unblock it before playing.
    Thank you for the instructions. WKS-KEYS can finally be used without displaying "Ciphertext with incorrect length". This translation was done using ChatGPT.
    As the file size of Android Studio was too large, I was unable to install it on the C drive and had to remove it. Instead, I installed it on the D drive. However, I cannot find the "platform-tools" folder, which may have been deleted. To transfer files, I used the command
    "adb.exe push F:\g\frida-server-16.0.19-android-x86\frida-server-16.0.19-android-x86 /sdcard"(The path needs to be specified to the file, not the folder.)
    Image Attached Thumbnails Click image for larger version

Name:	i03.png
Views:	203
Size:	524.3 KB
ID:	70631  

    Click image for larger version

Name:	i01.png
Views:	127
Size:	162.4 KB
ID:	70632  

    Last edited by a01196; 29th Apr 2023 at 20:28.
    Quote Quote  
  29. Can someone please look at this file and find out what are the dynamic function names that I should use with dumper? I also try with modified dumper by https://github.com/Diazole/dumper using --function-name 'qkfrcjtw' but it just print private key and then nothing continues.
    Image Attached Files
    Quote Quote  



Similar Threads

Visit our sponsor! Try DVDFab and backup Blu-rays!