Using the Trend Micro Rootkit Buster for Home Users

  • Solution ID: 1105740
  • Last Updated: Sep. 25, 2017 12:57 AM (PST)
  • Applies to: Antivirus+ Security - 2015;2016;2017;2018;Internet Security - 2015;Internet Security - 2016;Internet Security - 2017;Internet Security - 2018;Maximum Security - 2015;Maximum Security - 2016;Maximum Security - 2017;Maximum Security - 2018;Premium Security - 2015;Premium Security - 2016;Premium Security - 2017;Premium Security - 2018;
  • Using Rootkit Buster | Trend Micro Security

Rootkit, a malicious software, manipulates the components of Microsoft Windows operating system to conceal how it harms computer. It hides drivers, processes, and registry entries from tools that use common system application programming interfaces (APIs).

Download and run the Trend Micro Rootkit Buster to scan hidden files, registry entries, processes, drivers, services, ports, and master boot record (MBR) to identify and remove rootkits.

Note: This tool is only designed to scan your computer for rootkits. For other types of threats, use your Trend Micro Security instead.

For instructions, refer to this Knowledge Base article: Installing Trend Micro Security.


Features of Rootkit Buster
Download and run the Trend Micro Rootkit Buster