How to do Win7 network sharing 1061 error?

  

When a friend recently started network sharing under windows7 system, shared access could not be enabled normally. The system prompts error 1061, that is, the service cannot accept control information at this time. How is this? What about it? what can we do about it? In fact, the main reason for this problem is caused by the hazard of the worm in the system. For details, please refer to the following introduction.

analyze the reasons:

Virus Name: worm Win32.Luder.I

Other Name: W32 /Dref-U (Sophos), Win32 /Luder. I! Worm, W32.Mixor.Q@mm (Symantec), W32/Nuwar@MM (McAfee), W32/Tibs.RA (F-Secure), Trojan-Downloader.Win32.Tibs.jy (Kaspersky)

Virus Attributes: Worm

Hazard: Medium Hazard

Popularity: High

Specific:

Virus Features:

Win32/Luder.I is a worm that spreads via email and is hosted in PE files and RAR files for propagation. In addition, it also generates a Trojan to download and run other malicious programs. It is a Win32 executable that is 17,559 bytes in size.

Infection mode:

At runtime, copy Win32/Luder.I to %System%\\ppl.exe and set the file property to hidden. Then, modify the following registry key to ensure that this copy is run every time the system starts: HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\agent = “%System%\\ppl.exe. .  quo;HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\agent = “%System%\\ppl.exe. . ”

Note: ‘%System%’ is a mutable path. The virus determines the location of the current system folder by querying the operating system. The default system installation path for Windows 2000 and NT is C:\\Winnt\\System32; 95,98 and ME are C:\\Windows\\System; XP is C:\\Windows\\System32.

Luder also generates and runs a file with an arbitrary name and detects Win32/Sinteri! Downloader Trojan virus. The worm also generates “kkk33ewrrt” mutexes to ensure that only one copy runs at a time.

Mode of Propagation:

Send a virus by mailing the worm from the local system to get the email address. It looks up the email address in the Windows Address Book via the following registry key: HKCU\\Software\\Microsoft\\WAB\\WAB4\\Wab File Name Next, search from ‘Z:\\’ to ‘C:\\& rsquo; on the drive Files with the following extensions:

rar

scr

exe

htm

txt

ht

a The worm performs a DNS MX (mail exchanger) query to find the appropriate mail server for each domain to send the virus. It uses a locally configured default DNS server to perform these queries. Previous12Next page Total 2 pages

Copyright © Windows knowledge All Rights Reserved