Capcom has released a new tool to undo what it has previously done in a prior Street Fighter V patch on PC.
The patch in question installed an unsecured rootkit on players’ Windows PC’s before requesting kernel level access. This access request was a big flag that whatever Capcom had just done, wasn’t good. The Capcom.sys driver “doesn’t specify any security, so any user at any privilege level can attempt to open and control the device.”
The instructions on how to use the tool if you did install the previous patch has been posted on the Steam page. Not everyone will need to run the tool and the process applies to players that meet the criteria below.
Users who have downloaded the title update Ver.1.09 on 9/22, but have not applied the additional patch that became available on 9/23, as well as users who had not restarted their PC after applying the additional patch.
The reason the rootkit file came to be is that Capcom were looking to harden their security against some people cracking the executable and injecting hacks into the game for cheating purposes. This in addition to Steam DRM would hopefully mean that players used legitimate copies. This in itself isn’t necessarily a bad thing but the way Capcom went about it with the Street Fighter V patch basically opened your PC to more malicious backdoors into your machine.
If you are interested in reading more about why what Capcom did was bad then check out the article over on The Register.