Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Using the Trend Micro Rootkit Buster

    • Updated:
    • 6 Nov 2016
    • Product/Version:
    • OfficeScan 11.0
    • Worry-Free Business Security Standard/Advanced 8.0
    • Worry-Free Business Security Standard/Advanced 9.0
    • Platform:
    • Macintosh Leopard
    • Macintosh Lion
    • Macintosh Snow Leopard
    • Windows 2000 Professional
    • Windows 2000 Server
    • Windows 2003 Compute Cluster Server
    • Windows 2003 Datacenter Server
    • Windows 2003 Enterprise Server
    • Windows 2003 Home Server
    • Windows 2003 Small Business Server
    • Windows 2003 Standard Server Edition
    • Windows 2003 Storage Server
    • Windows 2003 Web Server Edition
    • Windows 2008 Enterprise Server
    • Windows 2008 Standard Server Edition
    • Windows 2012 Standard
    • Windows 2012 Standard R2
    • Windows 7 32-bit
    • Windows 7 64-bit
    • Windows 8 32-bit
    • Windows 8 64-bit
    • Windows 8.1 32-bit
    • Windows 8.1 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP Home
    • Windows XP Professional
Summary

Rootkit, a malicious software, manipulates the components of Microsoft Windows operating system to conceal how it harms computer. It hides drivers, processes, and registry entries from tools that use common system application programming interfaces (APIs).

Download and run the Trend Micro Rootkit Buster to scan hidden files, registry entries, processes, drivers, services, ports, and master boot record (MBR) to identify and remove rootkits.

Details
Public

The Rootkit Buster Pro is an enhanced version of the Rootkit Buster and contains Clean Boot. The Clean Boot feature triggers a scan to remove and fix malware issues before the operating system is loaded

To use the Rootkit Buster Pro:

  1. Download the Rootkit Buster Pro tool that corresponds to your system type and save the file to your desktop
  2. Do either of the following:
    • For Windows XP: Double-click RootkitBusterPro.exe to run the file.

      RootkitBuster.exe

    • For Windows Vista, 7, 8: Right-click RootkitBusterPro.exe, then select Run as administrator. The following error message appears when you do not run the installer with administrator privileges:

      Rootkit Buster error

  3. Read the license agreement.
  4. Select I accept the terms of the license agreement, then click Next.

    License Agreement

  5. Click Scan Now.

    Start scan

    Wait for the program to finish scanning your computer until you see the result of the scan.

    Scan in progress

    Click image to enlarge

  6. Tick the detected threats, then click Fix Now.

    Resolve threats

    Wait for the Trend Micro Rootkit Buster Pro to fix the threats.

    Removing threats

  7. Click Restart Now.

    Restart now

    Instead of booting your Windows operating system, Clean Boot will be executed to continue with the cleanup process.

    Processing Files

    The computer will be restarted to finish the clean up process and Windows operating system will be loaded.

Premium
Internal
Rating:
Category:
Configure; Remove a Malware / Virus
Solution Id:
1034393
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.