Ask questions. Help others.
The HP Community is here for you.
Post new question
Note on archived topics.
This topic has been archived. Information and links in this thread may no longer be available or relevant.
If you have a question create a new topic by clicking here, or click on "Post new question" above and select the appropriate board.
Honor Student
Posts: 3
Member Since: ‎09-11-2011
Message 1 of 2 (704 Views)

firmware rootkits

[ Edited ]

I have hp pavilion dv6 with windows 7 64-bit OS. While scanning with Symantec Endpoint Protection, the following files are shown at %windows% - 9129837.exe , hide_evr2.sys and at %windows%syswow64 - virusremoval.vbs , ntos.exe

How to remove these rootkits?


I have restored factory settings after repartitioning but they are still there.


Are they resident in firmware in NIC?

0 Kudos
Top Student
Posts: 5
Member Since: ‎08-25-2011
Message 2 of 2 (660 Views)

Re: firmware rootkits



I would first try scanning the system in Safe-mode with the latest Rapid Release definitions.


If that fails to detect and remove this threat, there are some useful tools that are provided by Symantec for help with finding these hard to detect threats.

1.    The Power Eraser Tool eliminates deeply embedded and difficult to remove threats that traditional virus scanning doesn't always detect.

2. The SERT (Symantec Endpoint Recovery Tool) is useful in situations where computers are too heavily infected for the Symantec Endpoint Protection client installed upon them to clean effectively.


3. The Load point Analysis Tool generates a detailed report of the programs loaded on your system. It is helpful in listing common loadpoints where threats can live.



Rapid Release Virus Definitions –


Power Eraser tool –


How To Use the Symantec Endpoint Recovery Tool with the Latest Virus Definitions –


Support Tool with Power Eraser Tool included –

How to use the Load Point Analysis within the Symantec Support Tool to help locate suspicious files

If you are unable to remove the threat(s) from your systems, please submit the suspected files to Symantec for analysis. New signatures will be created and included in future definition sets for detection.



† The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation