signature=ad4eaffae599c82c40f7f74d585e5efb,百度网盘打不开,急急急

该博客内容涉及Windows操作系统内核层面,详细列出了多个系统调用如NtWaitForSingleObject、RtlFreeHeap等,并提到了BaiduNetdisk(百度网盘)的YunLogic.dll和msvcr120.dll等动态链接库的函数调用,涉及到内存管理和资源查找等操作。此外,还提及了堆管理、调试缓冲区创建和虚拟内存映射等功能。
摘要由CSDN通过智能技术生成

代码太长了,接上。

Main thread call stack:

Call stack:

Address Offset Frame Function SourceFile

7789F8E1 0001F8E1 0041EAE4 0001:0000F8E1 C:\Windows\SysWOW64\ntdll.dll NtWaitForSingleObject+15

778CE70A 0004E70A 0041EB1C 0001:0003E70A C:\Windows\SysWOW64\ntdll.dll LdrFindResource_U+1AF

7793EC58 000BEC58 0041EB48 0001:000AEC58 C:\Windows\SysWOW64\ntdll.dll RtlWalkHeap+B47

778CE5EE 0004E5EE 0041EB70 0001:0003E5EE C:\Windows\SysWOW64\ntdll.dll LdrFindResource_U+93

778B858A 0003858A 0041EBA4 0001:0002858A C:\Windows\SysWOW64\ntdll.dll RtlLockHeap+39

7793F808 000BF808 0041EBD0 0001:000AF808 C:\Windows\SysWOW64\ntdll.dll RtlValidateProcessHeaps+257

77923B8E 000A3B8E 0041EBEC 0001:00093B8E C:\Windows\SysWOW64\ntdll.dll RtlQueryProcessBackTraceInformation+160

7793DAA4 000BDAA4 0041EBF4 0001:000ADAA4 C:\Windows\SysWOW64\ntdll.dll RtlEnumProcessHeaps+73

7793DA92 000BDA92 0041EC08 0001:000ADA92 C:\Windows\SysWOW64\ntdll.dll RtlEnumProcessHeaps+61

778E5486 00065486 0041EC28 0001:00055486 C:\Windows\SysWOW64\ntdll.dll RtlTestBit+2FC

7793F133 000BF133 0041EC30 0001:000AF133 C:\Windows\SysWOW64\ntdll.dll RtlMultipleFreeHeap+7D

778AE40C 0002E40C 0041EC8C 0001:0001E40C C:\Windows\SysWOW64\ntdll.dll RtlInitUnicodeString+164

7790D78B 0008D78B 0041ECCC 0001:0007D78B C:\Windows\SysWOW64\ntdll.dll RtlUlonglongByteSwap+10A7B

77924286 000A4286 0041ED40 0001:00094286 C:\Windows\SysWOW64\ntdll.dll RtlQueryProcessHeapInformation+288

778AE0A3 0002E0A3 0041ED58 0001:0001E0A3 C:\Windows\SysWOW64\ntdll.dll RtlFreeHeap+7E

770E14AD 000114AD 0041ED70 0001:000014AD C:\Windows\syswow64\kernel32.dll HeapFree+14

77902C40 00082C40 0041ED88 0001:00072C40 C:\Windows\SysWOW64\ntdll.dll RtlUlonglongByteSwap+5F30

6C1B0771 00310771 0041ED9C 0001:0030F771 D:\BaiduNetdisk\YunLogic.dll DllUnregisterServer+145C81

6C1C341B 0032341B 0041EDA0 0001:0032241B D:\BaiduNetdisk\YunLogic.dll

7789FC72 0001FC72 0041EDA4 0001:0000FC72 C:\Windows\SysWOW64\ntdll.dll NtMapViewOfSection+12

778F613D 0007613D 0041EDB0 0001:0006613D C:\Windows\SysWOW64\ntdll.dll RtlCreateQueryDebugBuffer+68

7789FAE2 0001FAE2 0041EDB4 0001:0000FAE2 C:\Windows\SysWOW64\ntdll.dll ZwAllocateVirtualMemory+12

778F6162 00076162 0041EDEC 0001:00066162 C:\Windows\SysWOW64\ntdll.dll RtlCreateQueryDebugBuffer+8D

7716611B 0009611B 0041EE1C 0001:0008611B C:\Windows\syswow64\kernel32.dll Heap32Next+4D

6C1CD249 0032D249 0041EE6C 0001:0032C249 D:\BaiduNetdisk\YunLogic.dll

7710882A 0003882A 0041EEC4 0001:0002882A C:\Windows\syswow64\kernel32.dll Process32Next+0

778AE0A3 0002E0A3 0041EEDC 0001:0001E0A3 C:\Windows\SysWOW64\ntdll.dll RtlFreeHeap+7E

770E14AD 000114AD 0041EEF0 0001:000014AD C:\Windows\syswow64\kernel32.dll HeapFree+14

73B5ECFA 0000ECFA 0041EF04 0001:0000DCFA D:\BaiduNetdisk\MSVCR120.dll free+1A

73D18B91 00058B91 0041EF18 0001:00057B91 D:\BaiduNetdisk\Bull120U.DLL ?XLogWithTag@BULL@@YAJKKPB_W0ZZ+2FC1

73D18BAB 00058BAB 0041EF48 0001:00057BAB D:\BaiduNetdisk\Bull120U.DLL

76BE6214 00046214 0041EF5C 0001:00045214 C:\Windows\syswow64\ole32.dll CoGetComCatalog+4F7

778AE0A3 0002E0A3 0041EF80 0001:0001E0A3 C:\Windows\SysWOW64\ntdll.dll RtlFreeHeap+7E

6C5EE859 0005E859 0041EF88 0001:0005D859 D:\BaiduNetdisk\minosagent.dll minos_agent_logdev_setopt+55014

6C5EE873 0005E873 0041EF9C 0001:0005D873 D:\BaiduNetdisk\minosagent.dll

73CECA86 0002CA86 0041EFB0 0001:0002BA86 D:\BaiduNetdisk\Bull120U.DLL

73CECAA0 0002CAA0 0041EFF0 0001:0002BAA0 D:\BaiduNetdisk\Bull120U.DLL

778AE0A3 0002E0A3 0041F008 0001:0001E0A3 C:\Windows\SysWOW64\ntdll.dll RtlFreeHeap+7E

770E14AD 000114AD 0041F01C 0001:000014AD C:\Windows\syswow64\kernel32.dll HeapFree+14

73B5ECFA 0000ECFA 0041F030 0001:0000DCFA D:\BaiduNetdisk\MSVCR120.dll

6C5DD0F9 0004D0F9 0041F060 0001:0004C0F9 D:\BaiduNetdisk\minosagent.dll

6C5A9DE1 00019DE1 0041F07C 0001:00018DE1 D:\BaiduNetdisk\minosagent.dll

778AE0A3 0002E0A3 0041F090 0001:0001E0A3 C:\Windows\SysWOW64\ntdll.dll RtlFreeHeap+7E

76BE6214 00046214 0041F0A4 0001:00045214 C:\Windows\syswow64\ole32.dll CoGetComCatalog+4F7

75E8443A 0000443A 0041F0C8 0001:0000343A C:\Windows\syswow64\OLEAUT32.dll GetErrorInfo+519

75E83EA3 00003EA3 0041F0E4 0001:00002EA3 C:\Windows\syswow64\OLEAUT32.dll SysFreeString+4A

73D15B70 00055B70 0041F0F8 0001:00054B70 D:\BaiduNetdisk\Bull120U.DLL

73D15B88 00055B88 0041F180 0001:00054B88 D:\BaiduNetdisk\Bull120U.DLL

72F96DE4 00016DE4 0041F1A4 0001:00006DE4 C:\Windows\system32\uxtheme.dll GetThemeBool+793

75E05737 00015737 0041F1B4 0001:00005737 C:\Windows\syswow64\GDI32.dll DeleteObject+AE

76D76210 00016210 0041F1D0 0001:00006210

代码太长了,接上

d550ed5838f1bb1a702dcd07931e03fc.png

dd292a7b281481205760a4694a0b783d.png

464a5f05cf60ae43c7d8599ad85f94a7.png

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
根据您提供的签名值,可以得到以下信息: ``` address owner = 0x1234567890123456789012345678901234567890; address spender = 0x0987654321098765432109876543210987654321; uint256 value = 100; uint256 nonce = 1; uint256 deadline = 1634028589; ``` 下面是使用Solidity代码计算r,s,v的值的示例: ```solidity function splitSignature(bytes memory signature) private pure returns (uint8 v, bytes32 r, bytes32 s) { require(signature.length == 65, "Invalid signature length"); assembly { r := mload(add(signature, 32)) s := mload(add(signature, 64)) v := byte(0, mload(add(signature, 96))) } if (v < 27) { v += 27; } require(v == 27 || v == 28, "Invalid signature value"); return (v, r, s); } function getPermitRSV(bytes32 domainSeparator, bytes32 structHash, bytes memory signature) private pure returns (uint256 r, uint256 s, uint8 v) { (v, bytes32 rBytes, bytes32 sBytes) = splitSignature(signature); r = uint256(rBytes); s = uint256(sBytes); bytes32 digest = keccak256(abi.encodePacked("\x19\x01", domainSeparator, structHash)); address signer = ecrecover(digest, v, rBytes, sBytes); require(signer != address(0) && signer == owner, "Invalid signature"); return (r, s, v); } function getPermitSignature() public view returns (uint256 r, uint256 s, uint8 v) { bytes32 domainSeparator = keccak256(abi.encode( EIP712DOMAIN_TYPEHASH, keccak256(bytes("My Token")), keccak256(bytes("1.0")), chainId, address(this) )); bytes32 structHash = keccak256(abi.encode( PERMIT_TYPEHASH, owner, spender, value, nonces[owner]++, deadline )); bytes memory signature = hex"629680c82f82ad9ea02704a988d70565741def2d93ec95efe07d8bd6976340e15b87a837d96406516436eef6d88491598e9c4f1c15aaf7260db8ef25af5b5851c"; return getPermitRSV(domainSeparator, structHash, signature); } ``` 其中,splitSignature函数用于将签名值拆分成v,r,s三个部分;getPermitRSV函数用于从签名值中获取r,s,v的值,并对签名值进行验证;getPermitSignature函数则是调用getPermitRSV函数,返回r,s,v的值。 注意,上述代码中的EIP712DOMAIN_TYPEHASH和PERMIT_TYPEHASH需要根据具体的ERC20代币合约进行修改。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值