Maybe, maybe not. It depends on the attack. You have to assume that you don't have a clean system. You can't trust your binaries or APIs. If there is a rootkit... it's job is to hide itself.

You...