360压缩,看来又是个粗制滥造的软件
不下两分钟已经弄崩四五次了,出现这么个栈调用,大家也都知道是什么情况了吧:
0:000> kvn
# ChildEBP RetAddr Args to Child
00 00128688 7c92de5c 7c801e3a ffffffff c0000409 ntdll!KiFastSystemCallRet (FPO: [0,0,0])
01 0012868c 7c801e3a ffffffff c0000409 001289d4 ntdll!ZwTerminateProcess+0xc (FPO: [2,0,0])
02 0012869c 004c9453 ffffffff c0000409 310a3291 kernel32!TerminateProcess+0x20 (FPO: [Non-Fpo])
WARNING: Stack unwind information not available. Following frames may be wrong.
03 001289d4 004712e9 0000011e 0324028a 00000109 360zip+0xc9453
乌云上提交了这个漏洞的就是你吧,求速速联系我。某src。可加群号:3652789
已经给你们了~