Malicious Software Removal Tool

From Wikipedia, the free encyclopedia
Malicious Software Removal Tool
Windowsmrticon.png
MSRT Screenshot.png
Developer(s)Microsoft
Initial release13 January 2005; 17 years ago (2005-01-13)
Stable release
5.95 / 9 November 2021; 3 months ago (2021-11-09)[1]
Operating systemWindows 7 and later
Size37.5 MB
Available inEnglish, Portuguese, Arabic, Chinese, Czech, Danish, Dutch, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, Russian, Spanish, Swedish and Turkish
TypeOn-demand scanner
LicenseFreeware
Websitesupport.microsoft.com/en-us/help/890830/remove-specific-prevalent-malware-with-windows-malicious-software-remo Edit this on Wikidata

Microsoft Windows Malicious Software Removal Tool is a freely distributed virus removal tool developed by Microsoft for the Microsoft Windows operating system. First released on January 13, 2005,[2] it is an on-demand anti-virus tool ("on-demand" means it lacks real-time protection) that scans the computer for specific widespread malware and tries to eliminate the infection. It is automatically distributed to Microsoft Windows computers via the Windows Update service but can also be separately downloaded from the Microsoft Download Center.[3][4][5]

Reporting[]

The tool records its results in a log file located at %windir%\debug\mrt.log.[3] To run it manually at other times, users can start "mrt.exe" using the Windows Command Prompt or Run command in the Start Menu. For example:

Windows+R%windir%\system32\mrt.exe↵ Enter


The tool is configured to report anonymized data about any detected infections to Microsoft.[3] The reporting behavior is disclosed in the tool's EULA, and can be disabled if desired.[6]

Results[]

In a June 2006 Microsoft report,[2] the company claimed that the tool had removed 16 million instances of malicious software from 5.7 million of 270 million total unique Windows computers since its release in January 2005. The report also stated that, on average, the tool removes malicious software from 1 in every 311 computers on which it runs. On May 19, 2009, Microsoft claimed that the software has removed password stealer threats from 859,842 machines.[7]

In August 2013, the Malicious Software Removal Tool deleted old, vulnerable versions of the Tor client to end the spread of the Sefnit botnet (which mined for bitcoins without the host owner's approval and later engaged in click fraud). Approximately two million hosts had been cleaned by October;[8][9][10] although this was slightly less than half of the estimated infections, the rest of the suspected machines presumably did not have their automatic Windows Updates enabled or manually run.[11]

Compatibility and updates[]

Microsoft releases the updated tool every second Tuesday of every month (commonly called "Patch Tuesday") through Windows Update, at which point it runs once automatically in the background and reports if malicious software is found. The tool is also available as a standalone download.

Since support for Windows 2000 ended on July 13, 2010, Microsoft stopped distributing the tool to Windows 2000 users via Windows Update. The last version of the tool that could run on Windows 2000 was 4.20, released on May 14, 2013. Starting with version 5.1, released on June 11, 2013, support for Windows 2000 was dropped altogether. Although Windows XP support ended on April 8, 2014, updates for the Windows XP version of the Malicious Software Removal Tool would be provided until August, 2016; version 5.39. The latest version of MSRT for Windows Vista is 5.47, released on 11 April 2017.

Despite Microsoft ending general support for the Windows 7 operating system in 2020, updates are still provided to Windows 7 users via the standard Windows Update delivery mechanism.[12]

References[]

  1. ^ "Malicious Software Removal Tool 64-bit".
  2. ^ a b "Windows Malicious Software Removal Tool: Progress Made, Trends Observed". Microsoft. Retrieved 10 March 2010. Microsoft delivered the first version of the MSRT on January 13, 2005 in 24 languages to users of Windows 2000, Windows XP, and Windows Server 2003 computers.
  3. ^ a b c "The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008, Windows XP, or Windows 2000". Microsoft Support Center. Microsoft Corporation. 8 December 2009. Retrieved 22 December 2009.
  4. ^ "Download Details: Microsoft Windows Malicious Software Removal Tool (KB890830)". Microsoft Download Center. Microsoft Corporation. 8 December 2009. Retrieved 22 December 2009.
  5. ^ Savill, John (2005). "Windows IT Pro - "What's the Microsoft Windows Malicious Software Removal Tool?"". Archived from the original on 2013-05-14. Retrieved 5 July 2006.
  6. ^ "Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment". 8 December 2009. Retrieved 22 December 2009. Q3. How can I disable the infection-reporting component of the tool so that the report is not sent back to Microsoft? A3. An administrator can choose to disable the infection-reporting component of the tool by adding the following registry key value to computers [~snip~]
  7. ^ "Microsoft cleans password stealer tools from 859,842 PCs". Ars Technica. Condé Nast. 2009. Retrieved 21 May 2009.
  8. ^ McHugh, Molly (2014-01-17). "Microsoft's secret battle against the Tor botnet". The Daily Dot. Retrieved 2014-02-10.
  9. ^ "Microsoft uncovers Sefnit Trojan return after Groupon click-fraud scam - IT News from". V3.co.uk. Retrieved 2014-02-10.
  10. ^ "Tackling the Sefnit botnet Tor hazard - Microsoft Malware Protection Center - Site Home - TechNet Blogs". Blogs.technet.com. 2014-01-09. Retrieved 2014-02-10.
  11. ^ "Microsoft Takes Aim at Tor-Distributed Botnet - Computing Now | Newsfeed - IEEECS". Computer.org. Retrieved 2014-02-10.
  12. ^ "Remove specific prevalent malware with Windows Malicious Software Removal Tool (KB890830)". support.microsoft.com. Retrieved 2021-11-07.

Further reading[]

External links[]

Retrieved from ""