perlapp exe 分析

# 通过script定位 ![image](https://img2023.cnblogs.com/blog/1145982/202308/1145982-20230820210616311-1093567004.png) # 跟进,定位extract ```c++ void *__fastcall
posted @ 2023-08-20 21:14  DirWangK  阅读(24)  评论(0编辑  收藏  举报