Fact-checked by Grok 2 weeks ago

Malicious Software Removal Tool

The Windows Malicious Software Removal Tool (MSRT) is a Microsoft utility designed to detect and remove specific prevalent , such as viruses, worms, and Trojans, from Windows-based computers, while also reversing changes made by these threats. First released in 2005 as 1.0, MSRT has been updated monthly on the second Tuesday of each month through or as a standalone download, with the November 2025 release marking 5.137. The tool targets a curated list of high-impact families, including recent threats like NetFleek, ShadowLink, RogueSpy, and KaziBora, but it is not intended as a full antivirus and should be used alongside comprehensive security software. MSRT operates by scanning the system for targeted threats, typically in a quiet mode during automatic updates, and provides notifications for any detections; users can also run it manually via the mrt.exe with options for full scans or quick checks. It supports , 10, 8.1, 7, and various Server editions up to 2022, but excludes older platforms like and Server 2008 after May 2025, as well as mapped network drives from scans. Key features include command-line switches for customized scans (e.g., /F for forced full scan), anonymous reporting of infection data to , and availability in 24 languages, though it requires administrator privileges and may necessitate a system restart for complete removal. Despite its effectiveness against specific threats, MSRT has limitations, such as not providing ongoing real-time protection and potentially failing to remove all infections, for which Microsoft recommends tools like Windows Defender Offline or the . In enterprise environments, it can be deployed via or scripts to ensure consistent scanning across networks.

Overview

Introduction

The Windows Malicious Software Removal Tool (MSRT) is a utility developed by to detect and remove specific, prevalent from computers running supported versions of Windows. It functions as an on-demand scanner, complementing rather than replacing full-featured by targeting a curated list of widespread threats such as , trojans, and rootkits. First released on January 13, 2005, the tool has been updated monthly to address evolving malware landscapes, with the latest stable version, 5.137, issued on November 11, 2025. It is licensed under freeware terms, making it accessible without additional cost to Windows users. MSRT supports 24 languages, automatically selecting the appropriate one based on the operating system's or defaulting to English if unsupported. It is compatible with and later editions, including , , , and various versions up to 2022 (with support for and 2008 R2 ending in May 2025), ensuring broad applicability across modern Windows ecosystems. Integrated into the Windows ecosystem, MSRT is automatically downloaded and executed monthly through for routine checks, allowing users to also run it manually via standalone installation for targeted scans. This supplementary role helps maintain system security by addressing threats that may evade primary defenses.

Purpose and Scope

The Windows Malicious Software Removal Tool (MSRT) serves as a specialized utility aimed at detecting and removing specific, widespread malware threats that may evade primary antivirus solutions. Its core objective is to address prevalent malicious software—such as viruses, , Trojan horses, and rootkits—that pose significant risks to Windows systems based on factors like infection rates and potential damage. By focusing on these high-impact threats, MSRT acts as a supplementary defense mechanism, helping to identify infections that persist despite standard protections. Targeted at individual Windows users and enterprises, the tool provides a second-opinion for those seeking verification of system cleanliness or dealing with suspected persistent infections. It is particularly useful in environments where comprehensive monitoring is already in place, offering an or scheduled check without replacing full antivirus suites. Enterprises can deploy it across networks to enhance overall remediation efforts, though it requires manual or automated invocation rather than continuous operation. The scope of MSRT is deliberately narrow and non-comprehensive, concentrating on 258 prevalent malware families per monthly release to prioritize effectiveness over breadth. This targeted approach enables low false positive rates by limiting detection to well-characterized, high-prevalence threats rather than attempting to cover the entire malware landscape. Unlike protectors, it performs periodic scans and does not provide ongoing monitoring, positioning it as a reactive tool within broader defense strategies. A key aspect of its functionality is the reversal of malware-induced changes, including modifications to registry entries, system files, and configurations that could compromise or performance. Upon successful removal, MSRT restores these elements to their pre-infection state where possible, reducing the need for extensive manual cleanup and minimizing residual risks. This emphasis on remediation underscores its role in supporting from known threats without introducing unnecessary disruptions.

History

Initial Development and Release

The Malicious Software Removal Tool (MSRT) was developed by starting in late 2003, following the company's acquisition of GeCAD Software, a antivirus firm, which provided expertise in detection and removal technologies. This effort built upon earlier standalone tools, such as the Blaster Worm Removal Tool released in January 2004, which addressed infections from the Win32/Blaster worm and ultimately removed from over 10 million computers. The development occurred amid escalating threats, including widespread worms like Blaster (exploiting a 2003 DCOM vulnerability) and Sasser (emerging in 2004), which highlighted the need for targeted removal solutions to mitigate damage from entrenched infections on Windows systems. The tool's initial release came on January 13, 2005, as knowledge base article KB890830 (version 1.0), available in 24 languages and compatible with , , and 2003. This debut version specifically targeted prevalent worms and viruses, including Blaster (Win32/MSBlast), Sasser (Win32/Sasser), (Win32/Mydoom), and Zindos, focusing on scanning for and reversing changes caused by these threats. Motivations for MSRT centered on augmenting traditional by providing a lightweight, no-cost utility for removing specific high-impact that could evade or persist despite standard protections, while also collecting anonymized data to inform Microsoft's broader security research. Unlike the contemporaneous Windows AntiSpyware (beta-released in January 2005, following Microsoft's acquisition of Software in December 2004), which emphasized and detection, MSRT addressed gaps in handling deeply rooted viruses and worms. From its launch, MSRT was integrated directly into Windows Update and Automatic Updates, enabling automatic delivery and execution on eligible systems without requiring user intervention beyond enabling updates. This seamless distribution facilitated rapid early adoption, with the tool executed approximately 2.7 billion times across 270 million unique computers in its first 15 months. By mid-2006, it had removed 16 million instances of from 5.7 million unique Windows computers, averaging one removal per 311 scanned systems and demonstrating significant impact against backdoor Trojans like Rbot and Sdbot, which accounted for a substantial portion of early detections. This release formed part of Microsoft's intensified security initiatives post-2003 vulnerabilities, aiming to bolster user protection through proactive, metric-driven response.

Updates and Platform Support Changes

The Malicious Software Removal Tool (MSRT) has been updated monthly since its initial release in January 2005, typically on the second Tuesday of each month as part of Microsoft's cycle, with each update adding or removing detection for specific families based on their current prevalence. These updates ensure the tool remains effective against evolving threats while optimizing performance on supported platforms. Key milestones in the tool's evolution include the end of support for in July 2010, aligning with the operating system's extended support lifecycle conclusion, after which versions were no longer compatible with that platform. Support for was extended beyond its general end-of-support date in 2014 and continued until August 2016, with the final compatible version released that month. Subsequent updates introduced optimizations for starting in 2015, enhancing scan efficiency and integration with the newer OS architecture, and further adaptations for in 2021 to address compatibility with its security features. More recently, support for and 2008 R2 ended in May 2025. Version progression spans from 1.0 in January 2005 to 5.137 in November 2025, encompassing approximately 251 releases over two decades. Each standalone download is approximately 77 MB in size, reflecting the inclusion of detection engines and removal scripts. As of 2025, the tool requires or later, including and corresponding Server editions from 2012 onward, ensuring alignment with Microsoft's active support lifecycle. Enterprise deployment has been available via (WSUS) since 2006, allowing administrators to manage and approve updates centrally. A distinctive aspect of these updates is the maintenance of , where new versions retain detection and removal capabilities for historical threats that remain prevalent, preventing the need for users to revert to older tool iterations.

Availability

Distribution via Windows Update

The Malicious Software Removal Tool (MSRT) is integrated into as the primary automated delivery mechanism, where it is downloaded and executed monthly on opted-in systems. This process aligns with Microsoft's schedule, occurring on the second Tuesday of each month (with occasional skips when no new threats require updates), ensuring users receive the latest version targeting newly prevalent threats without manual intervention. By default, the tool is enabled through settings for automatic updates, running silently in quiet mode to minimize user disruption; it only prompts for interaction if is detected during the scan. Users can opt out by reviewing and declining the tool's license terms directly in the interface, preventing its installation and execution. Full monthly updates deliver the complete , such as 5.137 released on November 11, 2025, which includes enhanced detection capabilities for specific families. In cases where no new threats require updates, a lightweight file (Mrt.exe) is deployed instead, performing a rapid integrity check and self-deleting afterward to avoid unnecessary resource use. For enterprise settings, the MSRT supports bulk deployment via (WSUS), allowing administrators to manage distribution across networks since the tool's initial releases in 2005. This method integrates seamlessly with existing update infrastructures, enabling scheduled executions and compliance monitoring without relying on individual user actions.

Standalone Downloads and Installation

Users seeking manual access to the Windows Malicious Software Removal Tool (MSRT) can download standalone versions directly from the official Download Center, providing an alternative to automated distribution through . The tool is available in separate packages for 32-bit (x86) and 64-bit (x64) architectures, ensuring compatibility with various Windows systems; the 32-bit version is accessible at ://www..com/en-us/download/details.aspx?id=16, while the 64-bit version is at ://www..com/en-us/download/details.aspx?id=9905. These downloads represent the executable variant, distinct from the monthly full release integrated into . To install and run the tool, users must download the appropriate file and execute it with local administrator privileges, as elevated rights are required for scanning and removal operations. Upon launch, the tool prompts acceptance of the license terms and self-extracts to a temporary directory containing the core , mrt.exe, without performing a permanent on the . After completing its tasks, the temporary files are typically deleted automatically, though users can manually remove the directory if needed; this design allows for repeated use without residual components. The MSRT supports and later versions, including , , , and corresponding editions such as 2022, 2019, 2016, 2012 R2, and 2012, provided the system meets signing requirements introduced in November 2019. privileges are mandatory, and the tool operates offline once downloaded, enabling use in environments without connectivity. It provides multilingual support in 24 languages, automatically selecting the operating system's language or defaulting to U.S. English if unsupported. This manual method contrasts with the passive delivery via , offering greater control for on-demand scans.

Operation

Scanning and Detection Process

The Malicious Software Removal Tool (MSRT) initiates scanning either automatically through in a quiet mode, where it runs silently without user intervention, or manually by executing the downloaded mrt.exe file, which presents a with a indicating scan phases. Detection relies primarily on signature-based matching to identify infections from a targeted set of prevalent malware families, scanning key system areas including files, registry entries, and running processes. Unlike comprehensive antivirus solutions, MSRT does not incorporate behavioral analysis and focuses solely on known signatures for viruses, , and horses within its scope. Users can select between a quick scan, which examines common infection locations such as startup folders and system directories for rapid detection, and a full system scan, which covers all fixed and removable drives and is recommended if initial threats are found. A full scan typically requires several hours to complete, depending on system hardware and storage size. During manual scans, the tool notifies users of detections via the interface and may prompt for a full scan or further actions; it can also be run in by launching mrt.exe from %windir%\system32 to address persistent threats.

Removal Actions and Logging

Upon detecting , the Malicious Software Removal Tool (MSRT) performs remediation by quarantining or deleting infected files, reversing malware-induced changes such as altered registry keys or settings, and prompting a system reboot if required to complete the process. If the removal is partial or unsuccessful due to factors like insufficient permissions or persistent threats, the tool displays results indicating the outcome—such as "partially removed" or "not removed"—and offers guidance on manual steps for cleanup, while recommending the use of an up-to-date antivirus for ongoing protection. The MSRT maintains detailed records in a log file at %windir%\debug\mrt.log, capturing timestamps for scan start and end times, lists of detected threats with names like "Virus:Win32/MPnTestFile.2004", removal outcomes such as "Removed!" or "partially removed", and error codes like 0x00000000 for success or 0x80508007 for specific failures. These error codes, including 0x80508019 for missing scan destinations or 0x80508007 for low memory, enable by matching them to procedures such as retrying the scan, freeing resources, or redownloading the . The also transmits anonymized telemetry to by default, encompassing the detected name, removal result, OS version, , processor , version, and an anonymous GUID to inform threat prevalence tracking; additional file samples may be sent with user consent, and reporting can be disabled via a registry setting in enterprise setups (HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT\DontReportInfectionInformation as DWORD value 1).

Targeted Threats

Covered Malware Families

The Malicious Software Removal Tool (MRT) targets a varying number of prevalent malware families per monthly release, prioritized by their global infection rates and damage potential, such as 6 in the October 2025 release (v5.136), with a cumulative coverage of 258 distinct families across its history as of November 2025 (v5.137). These families span multiple categories, including , trojans, rootkits, , backdoors, (such as password stealers), and botnets, reflecting the tool's focus on high-impact threats rather than exhaustive antivirus coverage. Worms, often self-propagating network threats, have been a core focus since the tool's inception; examples include early variants like Blaster (also known as MSBlast), Sasser, , and Netsky from 2005 releases, as well as later ones such as and VBS/Jenxcus. Trojans and backdoors, which enable unauthorized access and data theft, encompass families like Zbot (), RogueSpy, ZLoaderE, IcedId, NetFleek, and DCRat, with botnet capabilities in variants such as . Rootkits, designed to hide malicious activity, include (TDL family), F4IRootkit, and ShadowPad. Ransomware, which encrypts files for extortion, covers variants like , WannaCrypt, and other families. Spyware and password stealers, such as LummaStealer, along with exploit tools like ShadowLink, round out the coverage. Coverage has evolved by era to address shifting threats: early releases in 2005 emphasized worms like MSBlast and Sasser; mid-period updates around 2013 targeted trojans and botnets such as Sefnit and Vawtrak, alongside the 2015 inclusion of ; recent 2025 updates incorporate post-2021 Emotet resurgence variants, NetFleek, ShadowLink, and RogueSpy. Families are rotated, with declining threats removed and emerging ones added based on prevalence metrics, ensuring relevance to active risks. The complete list for each release is documented in the corresponding article, such as KB890830. MRT also addresses cross-platform threats impacting Windows. In 2025 updates, new signatures are incorporated variably, with the October release (v5.136) introducing NetFleek, ShadowLink, RogueSpy, ShadowWraith, and TofuStation, and the November release (v5.137) maintaining focus on evolving threats as detailed in KB890830. This selection is refreshed monthly to maintain focus on evolving threats.

Monthly Update Mechanism

The monthly update mechanism for the Malicious Software Removal Tool (MSRT) relies on Microsoft's Antimalware team conducting regular analysis of global threat data to identify and prioritize prevalent based on factors such as rates and potential damage. This process involves compiling new detection signatures into an updated executable that targets specific families and variants of threats. Threat intelligence for these updates draws from internal sources, including data aggregated from and broader security telemetry, as well as external references like the WildList for verified active . Releases are scheduled for the second Tuesday of each month, aligning with cycles, though exceptions occur in certain months such as December 2023, December 2024, March–April 2025, and July–September 2025. When the tool runs, it verifies its version against the registry key (HKEY_LOCAL_MACHINE\SOFTWARE[Microsoft](/page/Microsoft)\RemovalTools[MRT](/page/MRT)) to detect available updates and prompts a download via if a newer release exists. Updates are provided as full cumulative executables rather than incremental deltas, ensuring all prior and new signatures are included without requiring separate patches for older detections. Each monthly release features versioning in the filename, such as Windows-KB890830-V5.136.exe for October 2025 or V5.137.exe for November 2025, with associated changelogs detailing added detections available in support articles under KB890830. These versions maintain , preserving the ability to detect and remove threats identified in earlier iterations.

Impact and Effectiveness

Removal Statistics

Since its release in January 2005, the Malicious Software Removal Tool (MSRT) has removed significant volumes of from Windows systems worldwide. In the first 15 months of operation, the tool detected and removed 16 million instances of malicious software from 5.7 million unique computers, achieving an average removal rate of at least one instance per 311 executions. Early trends indicated substantial activity against prevalent threats, with backdoor trojans accounting for 62% of removals (approximately 3.5 million unique computers affected) and comprising 35% of cleaned systems during this period. By May 2009, MSRT had specifically removed password-stealing variants from 859,842 machines since beginning targeted detection of those families. Microsoft's Security Intelligence Reports from the tracked global infection rates using the computers cleaned (CCM) metric, defined as the number of unique computers cleaned per 1,000 on which MSRT ran. Worldwide CCM rates fluctuated but showed periods of elevation in the mid-2010s, reaching approximately 5.8 in the second quarter of 2013 (equivalent to 1 in 172 computers). As of March 2021, MSRT had removed more than 2 billion instances of malware worldwide.

Notable Cases and Broader Influence

One notable case involving the Malicious Software Removal Tool (MSRT) was its initial deployment in 2005 to target the Blaster, Sasser, and Mydoom worms, which had caused widespread disruptions, including network outages and system crashes affecting millions of Windows users globally. The tool's signatures for these threats enabled automated detection and cleanup during monthly Windows Update cycles, helping reverse changes such as backdoor installations and helping stabilize affected systems without requiring manual intervention. In 2007, MSRT played a role in combating the , a that powered and campaigns infecting over a million computers; Microsoft reported removing the from more than 526,000 unique systems in the latter half of the year through targeted updates. This effort contributed to diminishing the 's scale, though operators adapted variants, demonstrating MSRT's utility in large-scale, iterative threat mitigation. During the 2017 WannaCry outbreak, which exploited unpatched Windows systems to encrypt files across 150 countries and impacted healthcare and , Microsoft rapidly updated MSRT on May 22 to detect and remove the WannaCrypt variant, aiding recovery efforts by reversing file modifications and payload executions on infected machines. This update was distributed via , complementing emergency patches and helping contain the worm's propagation in environments where real-time antivirus was insufficient. Beyond specific incidents, MSRT's telemetry data on infection patterns has supported global threat reduction by informing Microsoft's security intelligence reports and aiding law enforcement in operations against persistent malware families like those in ransomware campaigns.

Limitations

Scope and Coverage Gaps

The Malicious Software Removal Tool (MSRT) is intentionally designed with a narrow scope, focusing exclusively on a limited set of prevalent malware families that Microsoft identifies as widespread threats to Windows systems. Rather than providing broad-spectrum protection, it targets specific, high-impact infections through signature-based detection updated monthly via Windows Update, deliberately excluding low-prevalence variants, emerging zero-day exploits, and less common threats that do not meet criteria for inclusion in its payload. Key coverage gaps stem from MSRT's role as a supplementary, scanner rather than a comprehensive antivirus . It lacks real-time monitoring, behavioral analysis, or proactive defenses against non-signature-based attacks, offering no ongoing protection between scans and functioning solely as a post-infection cleanup tool. Additionally, MSRT is limited to Windows operating systems, providing no support for macOS, , or mobile platforms like or , and it does not address threats outside its targeted families, such as , potentially unwanted applications (PUAs), browser hijackers, or toolbars. Microsoft positions MSRT as a complement to full antimalware products like Windows Defender Antivirus, explicitly stating it is not a substitute for continuous, multi-layered protection. In contrast to comprehensive suites such as , which include scheduled scanning, shielding, and web-based threat blocking in their premium versions, MSRT offers no such features and relies on manual or monthly automated execution.

Performance and Resource Usage

The Malicious Software Removal Tool (MSRT) is engineered for minimal system intrusion. Full scans demand higher resources than quick scans. Scan durations vary by type, system , and medium; quick scans are faster while full scans can take longer, up to several hours, performing better on SSDs than on traditional HDDs due to improved read speeds. On older , the tool may cause noticeable slowdowns. Several features mitigate performance impacts: the tool operates in the background to avoid disrupting user activities and self-deletes its files post-run to reclaim disk space.

References

  1. [1]
    Remove specific prevalent malware with Windows Malicious ...
    Discusses the release of the Malicious Software Removal Tool (MSRT) to help remove specific prevalent malicious software from Windows-based computers.
  2. [2]
    Deploy Windows Malicious Software Removal Tool in an enterprise ...
    Use this tool to find and remove specific prevalent threats and reverse the changes that they made (see the "Covered malware families" list)
  3. [3]
    Windows Malicious Software Removal Tool 64-bit - Microsoft
    Oct 14, 2025 · Windows Malicious Software Removal Tool (MSRT) helps keep Windows computers free from prevalent malware. MSRT finds and removes threats and ...
  4. [4]
    Windows Malicious Software Removal Tool: Progress Made, Trends ...
    Jul 15, 2024 · The tool is designed to help identify and remove prevalent malware from customer machines and is available at no charge to licensed Windows users.
  5. [5]
    None
    ### Summary of Windows Malicious Software Removal Tool (MSRT) Development and Impact
  6. [6]
    The Microsoft Windows Malicious Software Removal Tool (MRT)
    Jul 1, 2012 · the Windows Malicious Software Removal Tool (MSRT) will no longer be offered to or supported on Windows 2000-based systems after July 13, 2010 ...Missing: milestones | Show results with:milestones
  7. [7]
    MRT ended for WinXP - Windows Security - CCleaner
    Sep 13, 2016 · Microsoft has ended support of the Windows Malicious Software Removal Tool ("MRT") for Windows XP systems. The final version for XP was August 2016.Missing: end 2000 milestones
  8. [8]
    WSUS and Windows malware removal tool - Spiceworks Community
    Apr 18, 2017 · The Windows malware removal tool (MSRT) is in WSUS under Update Rollups. Select the Update Rollup category in WSUS to find it. Approve all ...Missing: 2006 | Show results with:2006
  9. [9]
    Windows Malicious Software Removal Tool - Microsoft Update Catalog
    Windows Malicious Software Removal Tool - v5.136 (KB890830), Windows 7, Windows Server 2008, Update Rollups, 10/14/2025 ; Windows Malicious Software Removal Tool ...<|control11|><|separator|>
  10. [10]
    Windows Malicious Software Removal Tool 32-bit - Microsoft
    Oct 14, 2025 · Windows Malicious Software Removal Tool (MSRT) helps keep Windows computers free from prevalent malware. MSRT finds and removes threats and reverses the ...
  11. [11]
    Malicious Software Removal Tool Detects 1 infection but does NOT ...
    May 15, 2024 · Malicious Software Removal Tool Detects 1 infection but does NOT identify or remove it ... In a full seven-hour scan, the Microsoft Windows MSRT ...
  12. [12]
    How to troubleshoot an error when you run the Microsoft Windows ...
    To troubleshoot, locate the mrt.log file, find the error code, and match it to the table in this article for the corresponding procedure.Missing: methods | Show results with:methods
  13. [13]
    Microsoft cleans password stealer tools from 859,842 PCs - Ars ...
    Microsoft cleans password stealer tools from 859,842 PCs ... The Malicious Software Removal Tool (MSRT) is a ... Microsoft added the numbers for these six and ...
  14. [14]
    [PDF] Microsoft Security Intelligence Report
    In previous volumes of the Microsoft Security Intelligence Report, malware prevalence was measured by infection rate, defined as the number of computers.
  15. [15]
    [PDF] Microsoft Security Intelligence Report
    In addition, the MSRT detected and removed malware from 6.6 of every 1,000 unique computers scanned in. Korea in 2Q16 (a CCM score of 6.6, compared to the 2Q16 ...
  16. [16]
    Microsoft didn't crush Storm, counter researchers - InfoWorld
    Apr 25, 2008 · Rival security researchers say Storm is diminished not because of Microsoft and its MSRT but because the botnet's operators have been<|separator|>
  17. [17]
    Customer Guidance for WannaCrypt attacks - Microsoft
    May 13, 2017 · Those who have Windows Update enabled are protected against attacks on this vulnerability. For those organizations who have not yet applied the ...Missing: push | Show results with:push
  18. [18]
    The Windows Malicious Software Removal Tool has been updated ...
    May 26, 2017 · The May 22nd update was “to detect and remove WannaCrypt malware.” WannaCrypt is another name for WannaCry. You can run MSRT manually by simply typing “MRT” ...
  19. [19]
  20. [20]
    [PDF] Microsoft Security Intelligence Report
    Jul 7, 2017 · Recent releases of the Malicious Software Removal Tool (MSRT) collect and report details about the state of real-time antimalware software on a ...
  21. [21]
    A systematic literature review on Windows malware detection
    Signature-based detection techniques can detect known malware with a high detection rate and a low false-positive rate. ... MAPMon: A Host-Based Malware Detection ...
  22. [22]
    When will Microsoft update its Windows MSRT again? Hasn't ...
    Apr 9, 2025 · Download Windows Malicious Software Removal Tool 64-bit from Official Microsoft Download Center links to March '25 version.
  23. [23]
    What you don't know about the Windows Malicious Software ...
    Feb 6, 2009 · Microsoft says “For all supported languages, the same tool will show the correct language depending on the language of the operating system.”.
  24. [24]
    Fileless threats - Microsoft Defender for Endpoint
    Apr 24, 2024 · The term "fileless" suggests that a threat doesn't come in a file, such as a backdoor that lives only in the memory of a machine.Type I: No File Activity... · Hardware · Execution And Injection
  25. [25]
    Malwarebytes vs. Windows Malicious Software Removal Tool
    Windows Malicious Software Removal Tool (MSRT) helps keep Windows computers free from prevalent malware. MSRT finds and removes threats and reverses the changes ...