New
#11
You can try this http://support.microsoft.com/kb/2530126
Method 3: Start associated services
To stop and then restart these services by using a batch file, follow these steps:
- Click Start, type Notepad in the Search box and then click Notepad in the programs list.
- Select the following text, right click the selected text, and then click Copy. Right-click anywhere in the Notepad window, and then click Paste.sc config MpsSvc start= autosc config KeyIso start= autosc config BFE start= autosc config FwcAgent start= autonet stop MpsSvc net start MpsSvc net stop KeyIso net start KeyIsonet start Wlansvcnet start dot3svcnet start EapHostnet net stop BFE net start BFEnet start PolicyAgentnet start MpsSvcnet start IKEEXTnet start DcaSvcnet net stop FwcAgent net start FwcAgent
- In Notepad, Click File, click Save As, and then type in the File name box
- Click the Save as type box, and then click All Files (*.*).
- In the left pane, click Desktop, and then click Save.
- On the File menu, click Exit.
- On your desktop, right-click the Repair.bat file that you saved in step 5, and then click Run as administrator.
Important If you are prompted for confirmation to stop a service, press Y on the keyboard, and then press Enter.- Try to start Windows Firewall again. If you can start Windows Firewall, delete the Repair.bat file. To do this, right-click Repair.bat, click Delete, and then click Yes.
Be sure you change ALL passwords using a known 'clean' machine ... not the infected one.Trojan Win32.Sirefef is a malicious bot trojan family that uses security exploitation to drop other viruses and spyware onto compromised local and network machines. Usually, Win32.Sirefef opens a security backdoor which allows remote attackers access to upload and activate further malware on the system. The Win32.Sirefef trojan may also monitor users browsing activities and transmit sensitive personal information like banking data and passwords to outside hacker websites. Win32.Sirefef is usually distributed through corrupted e-mail attachments, IRC, P2P and social networks. It may also spread via malicious drive-by downloads installed onto hacked or malware websites