Yeah, the tool doesn't help much past this, it'll just tell you where the raw bytes are.
Basically, what is at that offset is (remnants of) a Berkeley DB file; you'll need manually do the forensic work to get the key out of it past that. Alternatively, there are services that will recover locked/corrupted wallet files I think, so you could extract a big blob around that byte offset and find someone that will do the forensic work for you.