下面是通过OD调试之后的堆栈信息。
以及解密之后的明文。
0019F08C |00000000
0019F090 |098C3658
0019F094 |098C34C0
0019F098 |098C32E0 ASCII "(为防止误认为违规信息,此处原内容为ip地址)"
0019F09C |098C32C8
0019F0A0 |0A8B0080 ASCII "(为防止误认为违规信息,此处原内容为ip地址)21154752009d609a65d5084298bb3e06961261c5c79a23d0114e074"
0019F0A4 |01F52DF8
0019F0A8 |0AA66810 ASCII "a8r33gQu1CulJEoSujuyGJvengdOQMCttYru1QVgUyykqU2CfhFmi37mwhSpAWitb1xuRqDwOVrpkiO7xjZS4+4QgVpMQpaqzrNM"
0019F0AC |0AA67100 ASCII "6c823705d31305a8e790f687c7213e02-c.key?Expires=1705903303&OSSAccessKeyId=LTAI5tDMKE2GVX8XmTHFkfbA&Si"
0019F0B0 |0AA663F0 ASCII "6c823705d31305a8e790f687c7213e02-c.key?$$$!=1705903303&OSSAccessKeyId=LTAI5tDMKE2GVX8XmTHFkfbA&Signa"
0019F0B4 |0A8E76D0 ASCII "6c823705d31305a8e790f687c7213e02-c.key?$$$!=1705903303&OSSAccessKeyId=LTAI5tDMKE2GVX8XmTHFkfbA&Signa"
0019F0B8 |0A8E6C30 ASCII "6c823705d31305a8e790f687c7213e02-c.key?$$$!=1705903303&OSSAccessKeyId=LTAI5tDMKE2GVX8XmTHFkfbA&##WWE"
0019F0BC |01F3FCB8 ASCII "6c823705d31305a8e790f687c7213e02-c.key?$$$!=1705903303&*****=LTAI5tDMKE2GVX8XmTHFkfbA&##WWE#=itDRTMB"
0019F0C0 |0A8E7450 ASCII "6c823705d31305a8e790f687c7213e02-c.key?$$$!=1705903303%%%%*****=LTAI5tDMKE2GVX8XmTHFkfbA%%%%##WWE#=i"
0019F0C4 |0AA851F0 ASCII "6c823705d31305a8e790f687c7213e02-c.key?$$$!@@1705903303%%%%*****@@LTAI5tDMKE2GVX8XmTHFkfbA%%%%##WWE#"
0019F0C8 |0A9234A0
0019F0CC |098D2210
0019F0D0 |098BCE98
0019F0D4 ]0019F108
0019F0D8 |0053E390 返回到 后台工具.0053E390
0019F0DC |000007D8
0019F0E0 |012CEB30 后台工具.012CEB30
0019F0E4 |000007D8
0019F0E8 |012CEB30 后台工具.012CEB30
0019F0EC |00000001
0019F0F0 |012CEB30 后台工具.012CEB30
https://wwjy.lanzouy.com/iS3A80q87iwh