Developer(s) | Microsoft |
---|---|
Initial release | 13 January 2005 |
Stable release | 5.120
/ 9 January 2024[1] |
Operating system | Windows 7 and later |
Size | 63.1 MB |
Available in | English, Portuguese, Arabic, Chinese, Czech, Danish, Dutch, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Norwegian, Polish, Portuguese, Russian, Spanish, Swedish and Turkish |
Type | On-demand scanner |
License | Freeware |
Website | support |
Microsoft Windows Malicious Software Removal Tool (MSRT) is a freeware second-opinion malware scanner that Microsoft's Windows Update downloads and runs on Windows computers each month, independent of the install antivirus software. First released on January 13, 2005,[2] MSRT does not offer real-time protection. It scans its host computer for specific, widespread malware, and tries to eliminate the infection. Outside its monthly deployment schedule, it can be separately downloaded from Microsoft.[3][1][4]
Availability
Since its January 13, 2005,[2] Microsoft releases the updated tool every second Tuesday of every month (commonly called "Patch Tuesday") through Windows Update, at which point it runs once automatically in the background and reports if malicious software is found. The tool is also available as a standalone download.[1]
Since support for Windows 2000 ended on July 13, 2010, Microsoft stopped distributing the tool to Windows 2000 users via Windows Update. The last version of the tool that could run on Windows 2000 was 4.20, released on May 14, 2013. Starting with version 5.1, released on June 11, 2013, support for Windows 2000 was dropped altogether. Although Windows XP support ended on April 8, 2014, updates for the Windows XP version of the Malicious Software Removal Tool would be provided until August, 2016; version 5.39. The latest version of MSRT for Windows Vista is 5.47, released on 11 April 2017.
Despite Microsoft ending general support for the Windows 7 operating system in 2020, updates are still provided to Windows 7 users via the standard Windows Update delivery mechanism.[5]
Operation
MSRT does not install a shortcut in the Start menu. Hence, users must manually execute %windir%\System32\MRT.exe
. The tool records its results in a log file located at %windir%\debug\mrt.log
.[3]
The tool reports anonymized data about any detected infections to Microsoft.[3] MSRT's EULA discloses this reporting behavior and explains how to disable it.[6]
Impact
In a June 2006 Microsoft report,[2] the company claimed that the tool had removed 16 million instances of malicious software from 5.7 million of 270 million total unique Windows computers since its release in January 2005. The report also stated that, on average, the tool removes malicious software from 1 in every 311 computers on which it runs. On May 19, 2009, Microsoft claimed that the software has removed password stealer threats from 859,842 machines.[7]
In August 2013, the Malicious Software Removal Tool deleted old, vulnerable versions of the Tor client to end the spread of the Sefnit botnet (which mined for bitcoins without the host owner's approval and later engaged in click fraud). Approximately two million hosts had been cleaned by October;[8][9][10] although this was slightly less than half of the estimated infections, the rest of the suspected machines presumably did not have their automatic Windows Updates enabled or manually run.[9]
References
- 1 2 3 "Windows Malicious Software Removal Tool 64-bit". microsoft.com. Microsoft. Retrieved 2024-01-11.
- 1 2 3 "Windows Malicious Software Removal Tool: Progress Made, Trends Observed". Microsoft. Retrieved 10 March 2010.
Microsoft delivered the first version of the MSRT on January 13, 2005 in 24 languages to users of Windows 2000, Windows XP, and Windows Server 2003 computers.
- 1 2 3 "Remove specific prevalent malware with Windows Malicious Software Removal Tool (KB890830)". Support. Microsoft. 8 December 2009.
- ↑ Savill, John (2005). "What's the Microsoft Windows Malicious Software Removal Tool?". Windows IT Pro. Archived from the original on 2017-05-11.
- ↑ "Remove specific prevalent malware with Windows Malicious Software Removal Tool (KB890830)". support.microsoft.com. Retrieved 2021-11-07.
- ↑ "Deployment of the Microsoft Windows Malicious Software Removal Tool in an enterprise environment". Support. Microsoft. 8 December 2009. Retrieved 22 December 2009.
Q3. How can I disable the infection-reporting component of the tool so that the report is not sent back to Microsoft? A3. An administrator can choose to disable the infection-reporting component of the tool by adding the following registry key value to computers [~snip~]
- ↑ Protalinski, Emil (22 May 2009). "Microsoft cleans password stealer tools from 859,842 PCs". Ars Technica. Condé Nast.
- ↑ McHugh, Molly (2014-01-17). "Microsoft's secret battle against the Tor botnet". The Daily Dot. Retrieved 2014-02-10.
- 1 2 Stevenson, Alastair (26 September 2013). "Microsoft uncovers Sefnit Trojan return after Groupon click-fraud scam - IT News from". V3.co.uk. Archived from the original on 7 August 2014.
- ↑ "Tackling the Sefnit botnet Tor hazard". Microsoft Malware Protection Center Threat Research & Response Blog. Microsoft. 9 January 2014. Archived from the original on 8 March 2016.
Further reading
- Horowitz, Michael (6 February 2009). "What you don't know about the Windows Malicious Software Removal Tool". Computerworld Blogs. Computerworld Inc. Archived from the original on 18 July 2011. Retrieved 13 July 2011.