Krovos
Member
Hello! I've started contracting out of a computer repair store in my area and ran into a rather unusual issue today.
I had a customer who's laptop, running Windows XP, had discontinued Microsoft Security Essentials, and was running without AV. This being so, he had caught "FBI Money Pak".
I have dealt with this malware script before and is usually resolved with a safe mode boot and a simple run of Malware-Bytes. This time, however, "FBI Money Pak" had disabled the laptop from booting into both "Safe Mode w/ Networking" and "Safe Mode w/ Command Prompt". Long story short, I rigged a work around, was able to run Malware-Bytes, and removed "FBI Money Pak".
Although I was able to remove the program, I was shocked that a program like that could inhibit my operating system from certain modes of booting.
For future planning, in a similar instance where my software rigging doesn't miraculously work, how could I tackle such a situation?
Are there any ways I could run AV's or Malware-Scanners POST BIOS?
Thank you!
I had a customer who's laptop, running Windows XP, had discontinued Microsoft Security Essentials, and was running without AV. This being so, he had caught "FBI Money Pak".
I have dealt with this malware script before and is usually resolved with a safe mode boot and a simple run of Malware-Bytes. This time, however, "FBI Money Pak" had disabled the laptop from booting into both "Safe Mode w/ Networking" and "Safe Mode w/ Command Prompt". Long story short, I rigged a work around, was able to run Malware-Bytes, and removed "FBI Money Pak".
Although I was able to remove the program, I was shocked that a program like that could inhibit my operating system from certain modes of booting.
For future planning, in a similar instance where my software rigging doesn't miraculously work, how could I tackle such a situation?
Are there any ways I could run AV's or Malware-Scanners POST BIOS?
Thank you!