Solved

MRT application in C:\[long string of characters]

Posted on 2014-03-13
2
381 Views
Last Modified: 2016-11-23
Hello!

First, please forgive me if this question/answer is located somewhere. My search on experts exchange did not yield the information I was looking for, could be that I didn't provide the correct key words to search. Please provide the link if this has already been answered, thank you!

Machine = Dell N5010 64-bit, Windows 7 Home Premium SP1
Noticed two new folders on C drive named with a long string of alphanumeric characters, for example f32763b4dd480b3dc239b032. The only content within each folder is an application named MRT.exe.

When I clicked on the folders to view contents, I was prompted with the MS User Account Control prompt to provide permissions. I clicked yes (hope I didn't screw something up by clicking yes).

I'm currently running a McAfee scan.

What is C:\[long string name]\MRT.exe? Why is this located in two different folders? Should I delete these folders? Could this be a vulnerability/security concern?

Thank you!
0
Comment
Question by:Suzza
2 Comments
 
LVL 29

Accepted Solution

by:
Paul Jackson earned 500 total points
ID: 39928212
MRT.exe is the Windows Malicious Software Removal Tool.
The folders you describe sound like temporary download folders that probably should have got deleted after install/update.
You should be fine deleting the folders as the installed version of mrt.exe will be in c:\windows\system32.
0
 

Author Closing Comment

by:Suzza
ID: 39932437
Thank you! I deleted the folders.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question