Solved

MRT application in C:\[long string of characters]

Posted on 2014-03-13
2
367 Views
Last Modified: 2016-11-23
Hello!

First, please forgive me if this question/answer is located somewhere. My search on experts exchange did not yield the information I was looking for, could be that I didn't provide the correct key words to search. Please provide the link if this has already been answered, thank you!

Machine = Dell N5010 64-bit, Windows 7 Home Premium SP1
Noticed two new folders on C drive named with a long string of alphanumeric characters, for example f32763b4dd480b3dc239b032. The only content within each folder is an application named MRT.exe.

When I clicked on the folders to view contents, I was prompted with the MS User Account Control prompt to provide permissions. I clicked yes (hope I didn't screw something up by clicking yes).

I'm currently running a McAfee scan.

What is C:\[long string name]\MRT.exe? Why is this located in two different folders? Should I delete these folders? Could this be a vulnerability/security concern?

Thank you!
0
Comment
Question by:Suzza
2 Comments
 
LVL 29

Accepted Solution

by:
Paul Jackson earned 500 total points
Comment Utility
MRT.exe is the Windows Malicious Software Removal Tool.
The folders you describe sound like temporary download folders that probably should have got deleted after install/update.
You should be fine deleting the folders as the installed version of mrt.exe will be in c:\windows\system32.
0
 

Author Closing Comment

by:Suzza
Comment Utility
Thank you! I deleted the folders.
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now