Malicious Software Removal Tool Explained

Malicious Software Removal Tool
Logo Size:32px
Screenshot Size:300px
Developer:Microsoft
Latest Release Version:5.127
Latest Release Date:[1]
Operating System:Windows 7 and later
Size:65.8 MB
Language:English, Portuguese, Arabic, Chinese, Czech, Danish, Dutch, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, Russian, Spanish, Swedish and Turkish
Genre:On-demand scanner
License:Freeware

Microsoft Windows Malicious Software Removal Tool (MSRT) is a freeware second-opinion malware scanner that Microsoft's Windows Update downloads and runs on Windows computers each month, independent of the install antivirus software. First released on January 13, 2005, MSRT does not offer real-time protection. It scans its host computer for specific, widespread malware, and tries to eliminate the infection. Outside its monthly deployment schedule, it can be separately downloaded from Microsoft.[2] [3]

Availability

Since its January 13, 2005,[4] Microsoft releases the updated tool every second Tuesday of every month (commonly called "Patch Tuesday") through Windows Update, at which point it runs once automatically in the background and reports if malicious software is found. The tool is also available as a standalone download.

Since support for Windows 2000 ended on July 13, 2010, Microsoft stopped distributing the tool to Windows 2000 users via Windows Update. The last version of the tool that could run on Windows 2000 was 4.20, released on May 14, 2013. Starting with version 5.1, released on June 11, 2013, support for Windows 2000 was dropped altogether. Although Windows XP support ended on April 8, 2014, updates for the Windows XP version of the Malicious Software Removal Tool would be provided until August, 2016; version 5.39. The latest version of MSRT for Windows Vista is 5.47, released on 11 April 2017.

Despite Microsoft ending general support for the Windows 7 operating system in 2020, updates are still provided to Windows 7 users via the standard Windows Update delivery mechanism.[5]

Operation

MSRT does not install a shortcut in the Start menu. Hence, users must manually execute %windir%\System32\MRT.exe. The tool records its results in a log file located at %windir%\debug\mrt.log.

The tool reports anonymized data about any detected infections to Microsoft. MSRT's EULA discloses this reporting behavior and explains how to disable it.[6]

Impact

In a June 2006 Microsoft report, the company claimed that the tool had removed 16 million instances of malicious software from 5.7 million of 270 million total unique Windows computers since its release in January 2005. The report also stated that, on average, the tool removes malicious software from 1 in every 311 computers on which it runs. On May 19, 2009, Microsoft claimed that the software has removed password stealer threats from 859,842 machines.[7]

In August 2013, the Malicious Software Removal Tool deleted old, vulnerable versions of the Tor client to end the spread of the Sefnit botnet (which mined for bitcoins without the host owner's approval and later engaged in click fraud). Approximately two million hosts had been cleaned by October;[8] [9] [10] although this was slightly less than half of the estimated infections, the rest of the suspected machines presumably did not have their automatic Windows Updates enabled or manually run.

Further reading

Notes and References

  1. Web site: Windows Malicious Software Removal Tool 64-bit . microsoft.com . . 2024-01-11 .
  2. Web site: Remove specific prevalent malware with Windows Malicious Software Removal Tool (KB890830) . Support . Microsoft . 8 December 2009.
  3. Web site: What's the Microsoft Windows Malicious Software Removal Tool? . Windows IT Pro . 2005 . John . Savill . dead . https://web.archive.org/web/20170511181730/http://windowsitpro.com/windows/q-whats-microsoft-windows-malicious-software-removal-tool . 2017-05-11.
  4. Web site: Windows Malicious Software Removal Tool: Progress Made, Trends Observed . 10 March 2010 . Microsoft delivered the first version of the MSRT on January 13, 2005 in 24 languages to users of Windows 2000, Windows XP, and Windows Server 2003 computers. . Microsoft.
  5. Web site: Remove specific prevalent malware with Windows Malicious Software Removal Tool (KB890830). 2021-11-07. support.microsoft.com.
  6. Web site: Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment . Support . Microsoft . 8 December 2009 . 22 December 2009 . Q3. How can I disable the infection-reporting component of the tool so that the report is not sent back to Microsoft? A3. An administrator can choose to disable the infection-reporting component of the tool by adding the following registry key value to computers [~snip~].
  7. Web site: Microsoft cleans password stealer tools from 859,842 PCs . . . Emil . Protalinski . 22 May 2009.
  8. Web site: McHugh . Molly . Microsoft's secret battle against the Tor botnet . The Daily Dot . 2014-01-17 . 2014-02-10.
  9. Web site: Microsoft uncovers Sefnit Trojan return after Groupon click-fraud scam - IT News from . V3.co.uk . 26 September 2013 . dead . https://web.archive.org/web/20140807035506/http://www.v3.co.uk/v3-uk/news/2297027/microsoft-uncovers-sefnit-trojan-return-after-groupon-click-fraud-scam . 7 August 2014 . Alastair . Stevenson.
  10. Web site: Tackling the Sefnit botnet Tor hazard . Microsoft Malware Protection Center Threat Research & Response Blog . . 9 January 2014 . https://web.archive.org/web/20160308062408/https://blogs.technet.microsoft.com/mmpc/2014/01/09/tackling-the-sefnit-botnet-tor-hazard/ . dead . 8 March 2016.