2021/01/06 12:02:57 2828126D r (reader) lower_card [videoguard2] write to cardreader
[*]2021/01/06 12:02:57 2828126D r (reader) D1 40 00 80 90 00 7E 0A F8 7B E1 1D 74 C1 2C EC
[*]2021/01/06 12:02:57 2828126D r (reader) 00 00 90 81 C0 01 7A D2 B1 32 30 2E 98 0C 8E 55
[*]2021/01/06 12:02:57 2828126D r (reader) 66 15 AE 8D 98 01 23 26 91 24 DC 55 66 08 B4 56
[*]2021/01/06 12:02:57 2828126D r (reader) CC 16 73 95 7B AC CA 5C 20 11 F9 E5 65 CA 42 2C
[*]2021/01/06 12:02:57 2828126D r (reader) E0 EA D3 F1 4C B5 BE 1C 4D F1 86 11 9C DF 92 21
[*]2021/01/06 12:02:57 2828126D r (reader) B3 24 C9 64 17 2A EC 8E 13 C7 36 28 93 D6 85 66
[*]2021/01/06 12:02:57 2828126D r (reader) 8A DA 57 67 D6 A9 29 80 15 6E DD FA 26 9E E6 3D
[*]2021/01/06 12:02:57 2828126D r (reader) E4 C8 7F A7 D6 24 3A 6A 25 DD 76 B8 D5 79 00 A3
[*]2021/01/06 12:02:57 2828126D r (reader) 51 E0 39 D9 A8 0A 99 F8 92 C2 19 6B F2 FC B6 E7
[*]2021/01/06 12:02:57 2828126D r (reader) 65 98 47 0E 47
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] Answer from cardreader:
[*]2021/01/06 12:02:58 2828126D r (reader) 90 20th
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] write to cardreader
[*]2021/01/06 12:02:58 2828126D r (reader) D3 54 00 00 58
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] Answer from cardreader:
[*]2021/01/06 12:02:58 2828126D r (reader) 72 D0 0C 36 FD AC EF 65 9C 3A 3D 6F E8 EA 95 70
[*]2021/01/06 12:02:58 2828126D r (reader) 3D CA E1 EC C0 2F 6C 26 D6 7C D6 93 98 26 DC 0A
[*]2021/01/06 12:02:58 2828126D r (reader) 98 A8 98 9D 9B 7C 7F 13 5F 98 CD FC 05 E3 58 DF
[*]2021/01/06 12:02:58 2828126D r (reader) BB EE B4 C9 E9 E9 54 C3 F4 43 58 36 3E F9 4A AF
[*]2021/01/06 12:02:58 2828126D r (reader) 67 E3 19 2B 86 A0 DD 0B AA 85 44 0B D9 88 BA A1
[*]2021/01/06 12:02:58 2828126D r (reader) 9E AE 1F 8D BC C9 0A 96 90 20
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] Decrypted payload
[*]2021/01/06 12:02:58 2828126D r (reader) 70 81 0A ED B3 45 84 76 00 00 0C 00 0C 01 22 02
[*]2021/01/06 12:02:58 2828126D r (reader) 00 EC 0E 02 01 00 0F 04 00 00 00 00 20 04 00 00
[*]2021/01/06 12:02:58 2828126D r (reader) 00 00 25 11 00 00 00 00 00 00 00 00 00 00 00 00 00
[*]2021/01/06 12:02:58 2828126D r (reader) 00 00 00 00 00 2A 04 0C 00 00 00 55 01 83 56 08
[*]2021/01/06 12:02:58 2828126D r (reader) 3C 7E 27 DA A4 0A 53 45
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] classD3 ins54: CW is crypted, trying to decrypt unique pairing mode 0x83
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] crypted CW is: 70810AEDB34584760000000000000000
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] use k1 (DES) for CW decryption in unique pairing mode
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] decrypted CW is: 71D96553901759D60000000000000000
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] cardreader_do_ecm: after csystem-> do_ecm rc = 1
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] cardreader_do_ecm: ret rc = 1
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] cardreader_process_ecm: cardreader_do_ecm returned rc = 1 (ERROR = 0)
[*]2021/01/06 12:02:58 2828126D r (reader) lower_card [videoguard2] ecm hash: 572796C063399CE1418E92B6F3DE30E7 real time: 135 ms
[*]2021/01/06 12:02:58 465CBF2B c (ecm) 1 ( ): found (138 ms) by lower_card (L / 1/2/2) (lg)