HEX
Server: Apache/2.4.41
System: Linux mainweb 5.4.0-182-generic #202-Ubuntu SMP Fri Apr 26 12:29:36 UTC 2024 x86_64
User: nationalmedicaregrp (1119)
PHP: 8.3.7
Disabled: exec,passthru,shell_exec,system,popen,proc_open,pcntl_exec
Upload Files
File: /home/manage/public_html/StarkbankEcdsa.dll
MZ����@���	�!�L�!This program cannot be run in DOS mode.

$PELA�q��" 0X�v � �`�ovO�(�luT  H.textW X `.rsrc(�Z@@.reloc�`@B�vH ?L6{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*0T(
((((�s$(
(	((*0Ro"(
o!(
(o!(
(
((
(
((e
(
*0(
rp(
o
[*0Ko
rp(
,~	*rp(
r#p(
`,~
*r9p(
s
z0
0rWp(Fr�p(Fr]p(Fr�p(Frcp(Fr�p(Frp�%�+(
rips�	rkp(Fr�p(Frqp(Fr�p(Frwp(Fr�p(Fr#p�%�*(
r}ps�
~
��%~	�%~
��s
%r�p~	o
(+~	o
%r�p~
o
(+~
o
�
*0�((Fo%
(
o(
(
(fo	ooo(o!o(eo'(
(
o((
o(e
	s=*0�((F
o2o;o<o(
o		(
o(eooo(o1	(
o(eooo(oo(o!( 
*0W(!
("
o#
o$

�
,o%
�s&

+	�%r�p('
o(
&	X
	�i2�o)
*
b(( (*j((((*0e(
,(
*(

(*
(e
++	(+
(
(
	(
(


j(,
-�(e*vo!o"(
s-
s$*0Lo#(
o!(
(
(eo"(
(
(e�s$*0o"(
,(*
(*
(*
s-
s$*o"(
(e
(
o!(
(
(e(
o!(
(
o#(
(
(
(e%(
(
(
(
(e(
(
(
(
(
(
(e
(
o"(
o#(
(e	s-
s$*0�	o"(
,*o"(
,*o!o#(
(
(e
o!o#(
(
(eo"o#(
(
(eo"o#(
(
(e
( 
,,	(.
,(*
(*
(
s-
s$*(*(
	(
%%(
(e%(
(e(
(e(
(
(
(
(
(e(
(
(
(
(e	o#(
o#(
(e
	
s-
s$*0�o"
(
(
`,(*
(*
(
s-
s$*(/
,*j(0
(1
`,(e( *(
(e
(
,(
(+
( (*(
(+
( ((*{*{*{*06(
(2
-(*
+(3

}}}*{*"}*{*"}*0Q(
((&(2
-((
(%o(
(
(f(-
(4
((*0C(%o	('(%o(%o(%o((%s4*^('(%o(H*0c
(*o5
s5
%(
(No6
%(+(Qo6
%(%o
(O(Ro6
%(Ro6
(M*F(,r�p(Z*��%r�p�o7
%�i.r�ps
z�(Y(/*0�(S
o8
�,rpo8
(D(
s
zo9
(To:
j(;
,%rSpo:
�o)
(
s
zo<
(W%o9
o8
(X%o=

o>
	,r�p(?
(
s
z(Uo@
oA
�,rpoA
(D(
s
zr�p(+~
oB
-b~�i		�
+
~�o�X	2�rapr�p(+r�pr�p
(C
(D
s
z~
oE
�io/Ro�iYrip
+
r�p(

X2�s5
%
(Eo6
%o6
([o(0*J(Is-
s)*{*{*"}*V(
}(3*0�(1o!(2o(H
(1o"(2o(H,9s5
%r�p(Eo6
%r�p(Eo6
%o6
%o6
([*s5
%o6
%o6
([*0c
�%�)(

s5
%(Oo6
%(2o
(Oo6
(Ms5
%o6
%(5(Po6
(M*F(6r�p(Z*2(Y(9*0C(S
o9
o8
�,r	po8
(D(
s
z(S%o9
o8
(UoA
(U
	o@
	oA
�,rQ	p	oA
(D(
s
zr�p(+~
oB
-b~�i�	
+	
~
�o�
X

2�rapr�p(+r�pr�p	(C
(D
s
z~
oE
(V%o9
o8
�,r�	ps
z(Jo(:*0�(
o�iZ.-r
p�i(?
r#
pZ(?
(D
s
z(K(D(J(D(F(F�s$
	o�_,b�%r=
p�%	o!�o)
�%r�p�%	o"�o)
�%rM
p�%o�(F
s
z	s4*{*{*V(
}}*�s5
%(;(No6
%(<(No6
(M*2(>(C*0v(S%o9

o8
�,r�
p(D(
s
z(T%o:
o<
(T%o:

o<
�,r�
p(D(
s
z	s=*2(B(@*(G
*(H
*08�iZsI

+�
r
p	�%oJ
&X�i2�o)
*0Io

]3rp(
X
[�%+[(i(K
�X2�*�o
]�oL
0��`,
rp(
 (M
*0trp(

o
Z00Zo
YsN
(

+@oL
03
oO

++rp�o)
rwp(?
(D
s
z*6(G(E*2(D(F*0�iY
�%(P
*0�iY(Q

�%(P
*2�%%Ҝ*0[
oR
+(S
�iX
(T
-���o%
�s5
%~'o6
%(\o6
%oU
([*	$0�j(0
,r�ps
zrp(

o
]3rp(

(E�~0+s5
%~#o6
%�i(Lo6
%o6
([*s5
%~#o6
%�iX(Lo6
%~"o6
%o6
([*0��
�1r�ps
z'1r�ps
zs5
%(ZX(Lo6
+�(]o6
X�i2�([
s5
%~&o6
%	�i(\o6
%	o6
([*�s5
%~$o6
%�i(\o6
%o6
([*�s5
%~%o6
%�i(\o6
%o6
([*�s5
%~X(Lo6
%�i(\o6
%o6
([*0F~!r
p(`(J(^%oV

oW
XXX(K(JsX
*0e~rp(`(J(^%oV

oW
X(KXX(J%�~2rps
z(D(FsY
*0�~ rCp(`(J(^%oV

oW
X(KXX(J
sZ
+$(_oV
o[
oW
(J�-�o\
o]
([(ZYo^
o^
o_
	s`
*0F~rIp(`(J(^%oV

oW
X(KXX(JsX
*0F~r�p(`(J(^%oV

oW
X(KXX(JsX
*0m(a
~_~.rOp(?
(
s
z~_(J(^%oV
oW
X(K
XX(J	sa
*0_�%r�p�o7

sb
+(�oc

	(ir�p(d
,	oe
X�i2�rip(f
(B*0h(C
sb
%r�pr�p(g
oe
o

+	@(ioe
	@X
	2�r�pr�p(g
oe
r�p(f
*0
oR

+(S
�iX
(T
-���o%
��%oR

+(S
�i(P
�iX(T
-���o%
�*	&D+o0q/r�ps
z~/(L*rp(h

o
]3rp(

(E�is5
%~`(Lo6
%o6
([*0� sZ

+~_~`o^
c0�oi
-o[
X
Y		o\
~_oj
s5
ok
+(l
(Lo6
(m
-���o%
�([*e#�0Y!(a
~_-~_sn
*~_�iY1r
ps
z(K(D (o
Xsn
*0<
�i1r
ps
zb
�~_X
X~_-�sn
*0K"(Do
op
(d
,0rA
pop
rc
p(a
rp(h
(D
s
z*�*0��� �� �� ��r�p�rp�rIp�r�p�rCp� r
p�!~(E�"~(E�#~(E�$~(E�%~ (E�&~!(E�'*(q
*(r
*0(s

j(0
,(
**0n#(t
,rq
ps
z(

(g%ou
ov
�%
~(	ow
	(x
(y
(z
,	(
*(f*0I$
({
+)]-XX
(|
(
(}
(~
j(,
-�(+*.s�
�(*�o
X1	op
*o
1oO
*rip*BSJBv4.0.30319l�#~(<#Stringsd!�
#US /#GUID0/#BlobW��)	
�3++i~�:$
�����
4^��	_�	~�	�	9�	��	��	�#B��
�
:���K

��
�S�[�
 ���h���	�y���
���E�U
��
��
�����Cs	<�|���	/9��/9	��/9�7/9�/9!�
/9%�
/91r/9;�Y�9B�p�9D���9J�	
�9M��9(c��
�9(e��9)i�9)ji,j/i,j�i,j,�?�x�e�R�������Z�n������!<�!O�!b���
�!%���!��!��14�1��1��1�1(�1"�12�1A�1P�1_�1/�1�1(�17�1F�1U�1%��3`3�
3�P �X �a �i �"r ��z ��� �p� �v� �d� �j"� �DH� �M� �(� �$-� �H� �(� ��
3	8!��G�!�iD�!�5M"��
ST#�Y	W�#��
_�$��y$%��
h=%��wX%� 
2#�%�@	�%�%�3	�&@&���(X'��w+�(��
h/�)�+
4�)�Z
4�)�44�)��
�4*�=�7"*�G�7+*�I83*�T8<*��
�9�*��
�;�*���;+�
�;s+��H;�+���;�+��	�<�-���=�-��?�-�=�?�-�G�?�-��
�@�-���B�.�
�C�.��HC/���C/��	�Dd0���E`1��	Hh1��
Hp1��
H�1�
�J�1�WHJ�1��	JF2�LKS2��L[2��Md2�N�2�?
O�2�1
P43�6
!Q�3�%
(S�3��0U�3�`
7V�3�`
?X#4�gH[04��N\�4�c
Y]d5�`^6��g_-6��g`Y6��na�6��vc�6�q
�dT7�<�e8�vfl8��vg�8���h<9��i�9���j:��Nl�:�\HmD;�
Hn<�Q�oh<�
�p�<��
�q=���t=��
Su�=��yu�=�Pv�=��	2w>�K	2y�>���{�>��
S|�>�!�|))))))))5�z(
W
Q(	,�	Q��
�|�
��	�	z��	�	�U
�	�	�	��	��	�	��	�	z�U
28))KX�
_
�
K)�K��_
�
K��
��
���S
S
D
iD
i�����i	�
U
(

Q)�������_
Q�i�	��
����
AA��
		��
M
i	�
�
�

)�
1�
9�
A�
I�
Q�
Y�
a�
i�
y�
q�
�$
*��
2��	2��	2��	;��?�FD��
H�L�(R��
�o
X�
�b	i�z�V��z��������v�+�!���
)�?���q�H��	��g	2�	��
��&��^;�'	��|�;�&&�
����7$�v$d&,d&�&�,�v4d&4�v��H<d&<�v�
��b	��(����(�9x9���
�/9+��1��6��
E�K�VI^	a�
sD�&D�;��Ld&L�v$�
z,�
zT�
T��T��TT��T
�<�
z4�
�\�
��H�&L\���b	�("��?T�DT��T�
sd�&d�;L�
z��g�sQ
yQZ�Y
2�'	�ld&l�v����
��u2�����
�_*��	2�l*Y����
E��������	��� k!k.�.�..#'.+^.3n.;{.C�.K�.S�.[�.c@kAk`kak�k�k�k�k�k�k�k�kkk k@k`k�k�k�k�k�k�kkk!k#kAkak�k�k�k k@k`k�k�k�kk k@k`k`k�k%������+A�����$?Pg�������):Abo~�		�5���z�n�Q�(�,�U
�2�8�K�X���K��
��			



!"#%&'(123;!<#a0m{��|��\��v)�v*w+����9v��__StaticArrayInitTypeSize=20hex160bytesHex0hex0hex31Nullable`1IEnumerable`1List`1secp256k1get_Item1prime256v1Int32Tuple`2Dictionary`2get_Item2D7671FE7757781CAEF1E1676426D6B8DA35F4B61D9C1BAFFDC2152830E8C93633742B67E3CDA39B0B51B7F1A632EB630F94A571188AE9D4C871DA220A5AF6A73Tuple`3hex224__StaticArrayInitTypeSize=24fromBase64toBase6435E710D5E441B1F950368BD4894EB229C51867D9CB5345759D6FC8B554EDDB46SHA256sha256p256hex127__StaticArrayInitTypeSize=28get_UTF8hex129<Module><PrivateImplementationDetails>get_Aset_Aget_Bset_BbytesHexBhexBbytesHexChexCbytesHexDhexDbytesHexFhexFget_Gset_Gget_Nset_NSystem.IOget_Pset_PStarkbankEcdsaSystem.Collections.GenericreadjacobianAddaddencodedexpectedencodeConstructedremoveConstructedencodeOidcurvesByOidget_oidset_oid<A>k__BackingField<B>k__BackingField<G>k__BackingField<N>k__BackingField<P>k__BackingField<oid>k__BackingField<nistName>k__BackingField<name>k__BackingField<curve>k__BackingField<r>k__BackingField<s>k__BackingField<secret>k__BackingField<point>k__BackingField<x>k__BackingField<y>k__BackingField<z>k__BackingFieldop_BitwiseAnddividendAppendnetstandardencodeSequenceremoveSequencedecodeencodemessageAddRangerangeIDisposablejacobianDoubleRuntimeFieldHandleFileTupleget_nistNameset_nistNamegetCurveByNameget_nameset_nameget_Oneget_IsOneValueTypeSignaturesignatureDisposeParseCreateCompilerGeneratedAttributeNeutralResourcesLanguageAttributeDebuggableAttributeAssemblyTitleAttributeTargetFrameworkAttributeAssemblyFileVersionAttributeAssemblyInformationalVersionAttributeAssemblyConfigurationAttributeAssemblyDescriptionAttributeCompilationRelaxationsAttributeAssemblyProductAttributeAssemblyCompanyAttributeRuntimeCompatibilityAttributeToByteget_Valueget_HasValuevalueEllipticCurveget_curveset_curvetagEncodingSystem.Runtime.VersioningFromBase64StringToBase64Stringbase64StringnumberFromStringfromStringToStringtoStringencodeOctetStringremoveOctetStringencodeBitStringremoveBitStringSubstringsubstringComputeHashEcdsaMathpathget_LengthreadLengthencodeLengthlengthBinaryAsciiop_GreaterThanOrEqualop_LessThanOrEqualStarkbankEcdsa.dllfromPemtoPempemget_Itemset_ItemSystemHashAlgorithmTrimRandomrandomminimummaximumnumop_GreaterThanop_LessThanfromJacobiantoJacobianrandomBetweensignMinJoinop_DivisionSystem.Globalizationop_SubtractionSystem.Reflectionop_AdditionArgumentExceptionmoduloget_Zeroget_IsZeroCurveFpqop_BitwiseOrget_rfromDertoDerreadNumberencodeNumberstringFromNumberhexFromNumbernumberStringBuilderRemainderencodeIntegerremoveIntegerBigIntegerToLowercheckSequenceErrordivisorGetEnumerator.ctor.cctorstrget_sSystem.NumericsSystem.DiagnosticsencodedPiecesSystem.Runtime.CompilerServicesSystem.ResourcesDebuggingModesNumberStylesreadBytesReadAllBytesintToCharBytesGetBytesNextBytesbytessupportedCurvesEllipticCurve.UtilscontainsStringSplitOptionsget_CharsRuntimeHelperscalculateParameterscombineByteArraysRemoveAtbytesHexAthexAtConcatAppendFormatremoveObjectget_secretset_secretop_LeftShiftop_RightShiftop_ImplicitSplitGetValueOrDefaultextractFirstIntget_CurrentvalidatePointget_pointget_CountstartInsertConvertbyteArrayListMoveNextSystem.TextReadAllTextinvPowGxget_xnumberFromHexbinaryFromHexindexhexGyget_ysliceByteArrayInitializeArrayToArrayPublicKeypublicKeyPrivateKeyprivateKeyContainsKeyverifySystem.Security.Cryptographyop_MultiplyjacobianMultiplymultiplyCopyhexFromBinaryop_Equalityop_Inequalityget_zXsecp256k1	p256prime256v1unknown curve ��0000000000000000000000000000000000000000000000000000000000000000��0000000000000000000000000000000000000000000000000000000000000007��fffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffc2f��fffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd0364141��79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798��483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8��ffffffff00000001000000000000000000000000fffffffffffffffffffffffc��5ac635d8aa3a93e7b3ebbd55769886bc651d06b0cc53b0f63bce3c3e27d2604b��ffffffff00000001000000000000000000000000ffffffffffffffffffffffff��ffffffff00000000ffffffffffffffffbce6faada7179e84f3b9cac2fc632551��6b17d1f2e12c4247f8bce6e563a440f277037d812deb33a0f4a13945d898c296��4fe342e2fe1a7f9b8ee7eb4a7c0f9e162bce33576b315ececbb6406837bf51f5P-256,x2EC PRIVATE KEY=-----BEGIN EC PRIVATE KEY-----invalid PEMKtrailing junk after DER private key: ]expected '1' at start of DER private key, got Oexpected tag 0 in DER private key, got _trailing junk after DER private key curve_oid: 1Unknown curve with oid [, K]. Only the following are available: 0004PUBLIC KEYItrailing junk after DER public key: Ytrailing junk after DER public key objects: Wtrailing junk after public key point-stringstring length [] should be point (3) is not valid for curve Gtrailing junk after DER signature: Ctrailing junk after DER numbers: 
{0:x2}0Wnumber hex length is bigger than 2*length: , length=)x cannot be negative)first has to be <= 2-second has to be <= 393002)nBytes must be < 1600603Qwanted constructed tag (0xa0-0xbf), got 
----------BEGIN -----END 3length cannot be negative/ran out of length bytes!wanted sequence 
, got Imaximum must be greater than minimum}��P@��wVB��    EAEAAAAAAA    }��I��
 
AAAAAAAAAA	MQQ��   MAAAAAA
 
AEAAAAAAAAAAAAAAAAAAA Y	 ��+UUAUAU UA	aU  !UUEAAAAM M A��A  
}}] ]]
 ��
YU	YUY   		 YY
��
Y]YYY]]�� AAAUA AU
A�{��-�Qsecp256k1AIeLPH A A     	AAAAAA $$ AAAAAAA
AA
 AAEA  
 EA         AA$$AAAA
YAUUAU
a
UUAA(A((((TWrapNonExceptionThrows6.NETStandard,Version=v2.0TFrameworkDisplayName
Stark BankReleasec^Pure C# implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) by Stark Bank1.0.0.0
1.0.0StarkbankEcdsa
en-US<���MP��u�W'HvHXRSDS�u(�tJ�	q����L/Users/caiodottori/Git/ecdsa/ecdsa-dotnet/EcdsaDotNet/EcdsaDotNet/obj/Release/netstandard2.0/StarkbankEcdsa.pdbSHA256�u(�t�r	q����L<��v?P�;����{%��v�v �v_CorDllMainmscoree.dll�% H='H='�
�0�HX���4VS_VERSION_INFO��?DVarFileInfo$Translation�,StringFileInfo000004b0�_CommentsPure C# implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) by Stark Bank6CompanyNameStark BankFFileDescriptionStarkbankEcdsa0FileVersion1.0.0.0FInternalNameStarkbankEcdsa.dll(LegalCopyright NOriginalFilenameStarkbankEcdsa.dll>ProductNameStarkbankEcdsa0ProductVersion1.0.08Assembly Version1.0.0.0p�6