Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ebp1 = (void*)((int32_t)__zero_stack_offset() - 4);
- eax2 = g0;
- v3 = eax2;
- eax4 = g395c3ef0;
- v5 = ebx6;
- v7 = esi8;
- v9 = edi10;
- v11 = (void*)(eax4 ^ (uint32_t)ebp1);
- g0 = (void*)((uint32_t)ebp1 - 12);
- ecx12 = 0xb1;
- while (ecx12) {
- --ecx12;
- }
- fun_39593a20((uint32_t)ebp1 - 0x334, v11, v9, v7, v5);
- fun_39594e20((uint32_t)ebp1 - 0x334, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v13, v14, v15, v16, v17, v18, v19, v20, v21, v22, v23, v24, v25, v26, v27, v28, v29);
- fun_395941f0((uint32_t)ebp1 - 96, "Length of modulus: %d\n", v30, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v31, v32, v33, v34, v35, v36, v37, v38, v39, v40, v41, v42, v43, v44);
- v45 = (void*)((uint32_t)ebp1 - 96);
- fun_39594e20((uint32_t)ebp1 - 0x334, v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v46, v47, v48, v49, v50, v51, v52, v53, v54, v55, v56, v57, v58, v59, v60, v61);
- fun_39594e20((uint32_t)ebp1 - 0x334, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v62, v63, v64, v65, v66, v67, v68, v69, v70, v71, v72, v73, v74, v75, v76);
- esi77 = (void*)0;
- do {
- v78 = static_cast<uint32_t>(*(uint8_t*)((uint32_t)ebp1 + (uint32_t)esi77 - 0x320));
- fun_395941f0((uint32_t)ebp1 - 96, "%x ", v78, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v79, v80, v81, v82, v83, v84, v85, v86, v87, v88, v89, v90);
- v91 = (void*)((uint32_t)ebp1 - 96);
- fun_39594e20((uint32_t)ebp1 - 0x334, v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v92, v93, v94, v95, v96, v97, v98, v99, v100, v101, v102, v103, v104, v105);
- esi77 = (void*)((uint32_t)esi77 + 1);
- } while ((int32_t)esi77 < (int32_t)0x80);
- fun_39594e20((uint32_t)ebp1 - 0x334, "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v106, v107, v108, v109, v110, v111, v112, v113, v114, v115, v116, v117, v118);
- fun_39594e20((uint32_t)ebp1 - 0x334, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v119, v120, v121, v122, v123, v124, v125, v126, v127, v128, v129, v130);
- esi131 = (void*)0;
- do {
- v132 = static_cast<uint32_t>(*(uint8_t*)((uint32_t)ebp1 + (uint32_t)esi131 - 0x220));
- fun_395941f0((uint32_t)ebp1 - 96, "%x ", v132, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v133, v134, v135, v136, v137, v138, v139, v140, v141);
- v142 = (void*)((uint32_t)ebp1 - 96);
- fun_39594e20((uint32_t)ebp1 - 0x334, v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v143, v144, v145, v146, v147, v148, v149, v150, v151, v152, v153);
- esi131 = (void*)((uint32_t)esi131 + 1);
- } while ((int32_t)esi131 < (int32_t)0x80);
- fun_39594e20((uint32_t)ebp1 - 0x334, "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v154, v155, v156, v157, v158, v159, v160, v161, v162, v163);
- fun_39594e20((uint32_t)ebp1 - 0x334, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v164, v165, v166, v167, v168, v169, v170, v171, v172);
- edi173 = (void*)((uint32_t)ebp1 - 0x1a0);
- ebx174 = 2;
- do {
- esi175 = (void*)0;
- do {
- v176 = static_cast<uint32_t>(*(uint8_t*)((uint32_t)edi173 + (uint32_t)esi175));
- fun_395941f0((uint32_t)ebp1 - 96, "%x ", v176, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v177, v178, v179, v180, v181, v182);
- v183 = (void*)((uint32_t)ebp1 - 96);
- fun_39594e20((uint32_t)ebp1 - 0x334, v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v184, v185, v186, v187, v188, v189, v190, v191);
- esi175 = (void*)((uint32_t)esi175 + 1);
- } while ((int32_t)esi175 < (int32_t)64);
- edi173 = (void*)((uint32_t)edi173 + 64);
- --ebx174;
- } while (ebx174);
- fun_39594e20((uint32_t)ebp1 - 0x334, "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v192, v193, v194, v195, v196, v197, v198);
- fun_39594e20((uint32_t)ebp1 - 0x334, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v199, v200, v201, v202, v203, v204);
- edi205 = (void*)((uint32_t)ebp1 - 0x120);
- ebx206 = 2;
- do {
- esi207 = (void*)0;
- do {
- v208 = static_cast<uint32_t>(*(uint8_t*)((uint32_t)edi205 + (uint32_t)esi207));
- fun_395941f0((uint32_t)ebp1 - 96, "%x ", v208, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v209, v210, v211);
- v212 = (void*)((uint32_t)ebp1 - 96);
- fun_39594e20((uint32_t)ebp1 - 0x334, v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v213, v214, v215, v216, v217);
- esi207 = (void*)((uint32_t)esi207 + 1);
- } while ((int32_t)esi207 < (int32_t)64);
- edi205 = (void*)((uint32_t)edi205 + 64);
- --ebx206;
- } while (ebx206);
- fun_39594e20((uint32_t)ebp1 - 0x334, "\n", v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v218, v219, v220, v221);
- fun_39594e20((uint32_t)ebp1 - 0x334, "coefficient:\n", "\n", v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v222, v223, v224);
- esi225 = (void*)0;
- do {
- v226 = static_cast<uint32_t>(*(uint8_t*)((uint32_t)ebp1 + (uint32_t)esi225 - 0xa0));
- fun_395941f0((uint32_t)ebp1 - 96, "%x ", v226, "coefficient:\n", "\n", v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5);
- fun_39594e20((uint32_t)ebp1 - 0x334, (uint32_t)ebp1 - 96, "coefficient:\n", "\n", v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v227, v228);
- esi225 = (void*)((uint32_t)esi225 + 1);
- } while ((int32_t)esi225 < (int32_t)64);
- fun_39594e20((uint32_t)ebp1 - 0x334, "\n", (uint32_t)ebp1 - 96, "coefficient:\n", "\n", v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5, v229);
- fun_39594e20((uint32_t)ebp1 - 0x334, "-- End of RSA Private Key Info:", "\n", (uint32_t)ebp1 - 96, "coefficient:\n", "\n", v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5);
- fun_39593b90((uint32_t)ebp1 - 0x334);
- g0 = v3;
- fun_3959c60c("\n", v212, "primeExponent:\n", "\n", v183, "prime:\n", "\n", v142, "publicExponent:\n", "\n", v91, "modulus:\n", v45, "-- Start of RSA Private Key Info:\n", v11, v9, v7, v5);
- return;
- }
- void fun_395947d7() {
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement