ObliqueRAT Trojan


ObliqueRAT is a Trojan horse infection that cybercriminals can use to destroy a computer in a number of ways. ObliqueRAT can serve as a tool for espionage, data and money theft, system corruption and more. Therefore, it should be removed immediately from the computer it has been detected on.


ObliqueRAT is a Remote Access Trojan.

Trojan horses are surprisingly common online threats and although not everyone is fully aware of what they are capable of, they can harm any given computer in a very serious way. Sadly, most users don’t know that they have been infected with a Trojan horse because such pieces of malware are extremely difficult to detect. Normally, this happens either with the help of professional security software or after some serious damage has occurred. As soon as the malware has been detected, however, numerous questions arise. Users who have located ObliqueRAT in their system, for instance, often ask us how to remove all the traces of the infection from their system without harming their machine. This is why we developed a removal guide that will provide you with all the steps needed to help you handle ObliqueRAT in the best possible way.

The ObliqueRAT Trojan

The ObliqueRAT trojan is one of the most hazardous programs that are currently being distributed on the Internet. ObliqueRAT can be described as a Trojan Horse virus that uses stealth and disguise to infiltrate computers and create massive botnets comprised of infected machines.

A Trojan like ObliqueRAT can easily corrupt your OS and make it unusable, aside from compromising your personal details. In some instances, though, the system’s resources could be more valuable than anything else for the hackers. With the assistance of the Trojan, they can exploit them to mine cryptocurrencies, send out spam, and perform remote processes without the victims’ consent.

Everyone tells us that Trojans are computer threats that are very malicious. But what does this really mean? First of all, let’s start by saying that these malicious software pieces are responsible for nearly 70% of all malware infections on the Internet. That is not by chance because the Trojans are very stealthy and can easily infect unsuspecting web users by presenting themselves as intriguing offers, web ads, links, and even email attachments. Only one careless click is enough to invite the malware inside the computer and from then on, it can unleash its malicious potential in the background of the system.

Trojans also have a range of destructive capabilities that make them particularly attractive to cybercriminals and people with malicious intentions. For example, different malicious tasks can be performed by such infections. One of the most common uses of threats like ObliqueRAT, for instance, is for the distribution of other forms of malware like Ransomware and Spyware. Normally, once in the system the Trojan can detect existing vulnerabilities of the OS and the software that is installed on it and exploit them to insert a virus or another infection without the users’ knowledge.

Theft may also be a possible use for infections such as ObliqueRAT. The criminals may be interested to steal the personal details of their victim for whatever reason. This means that if such a threat has nested inside your machine, your financial data, your login credentials, credit or debit card numbers, sensitive documents, and other valuable information could be accessed by people with malicious intentions and used against you in extortion schemes or in various fraud and illegal operations, where personal information may be misused.

With all this being said, we think you understand why you should remove ObliqueRAT as quickly as possible. This malware poses a real danger both to you and to your machine. In this respect, immediately after you have read this article we advise you to take action against the infection. The best method is to scan the device with a professional removal tool or by using the instructions given in the removal guide below.


Name ObliqueRAT
Type Trojan
Detection Tool

anti-malware offerOFFER *Read more details in the first ad on this page, EULA, Privacy Policy, and full terms for Free Remover.

ObliqueRAT Trojan Removal

Trojan Horse threats like ObliqueRAT typically hide deep in the system. Thus, their detection can be challenging even for experienced security professionals. Yet, there are some steps that may help you locate the threat and remove it quickly and here they are:

  1. Click on the Windows Start button (bottom left corner of the screen) and go to Control Panel.
  2. Once there, select Programs and Features and select Uninstall a Program.
  3. In the list of programs, look for ObliqueRAT, as well as any other unfamiliar programs.
  4. Uninstall ObliqueRAT and the other questionable-looking programs.

If these quick instructions aren’t enough to remove ObliqueRAT completely, the removal guide below contains more detailed steps that should help.


Before you do anything else, make sure that the page of this guide is Bookmarked so you can quickly get back to it and complete all the ObliqueRAT removal steps in case you are required to exit your browser during the removal process. 

Also, for the smooth and easy detection of the Trojan, we advise you to enter your computer in Safe Mode.



With your computer booted in Safe Mode, use the CTRL + SHIFT + ESC key combination to open the Windows Task Manager. Then, head to the Processes Tab.  Once you get there, carefully look at all the processes that are listed.  Search for processes could be operated by ObliqueRAT or appear to be dangerous and behave in an unusual way.


The moment you detect such a process, right-click on it and select the Open File Location option from the menu that pops up. When you get to the file location of the selected process, use the free online virus scanner below to scan the files found there for malware:

Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
This scanner is free and will always remain free for our website's users.
This file is not matched with any known malware in the database. You can either do a full real-time scan of the file or skip it to upload a new file. Doing a full scan with 64 antivirus programs can take up to 3-4 minutes per file.
Drag and Drop File Here To Scan
Drag and Drop File Here To Scan
Analyzing 0 s
Each file will be scanned with up to 64 antivirus programs to ensure maximum accuracy
    This scanner is based on VirusTotal's API. By submitting data to it, you agree to their Terms of Service and Privacy Policy, and to the sharing of your sample submission with the security community. Please do not submit files with personal information if you do not want them to be shared.

    The scanning process shouldn’t take long and when you see the results, follow the suggested actions. In case the scanned files get flagged as threats, end the related processes from the Processes tab, and then go to the file location to delete all the files and folders there. 


    Open a Run dialog box on the screen by pressing the Start and R keys from the keyboard together. When the dialog pops up, type appwiz.cpl in the empty text field.


    Click on the OK button and this will open the Control Panel. Once you get there, carefully look at the list of programs and uninstall any entries that seem to have a link to ObliqueRAT or look suspicious.

    You may get prompted with the following message when you click Uninstall on a given entry: 


    If you see this screen, make sure that you select NO.


    To remove parasite on your own, you may have to meddle with system files and registries. If you were to do this, you need to be extremely careful, because you may damage your system.

    If you want to avoid the risk, we recommend downloading SpyHunter
    a professional malware removal tool.

    More information on SpyHunter, steps to uninstallEULAThreat Assessment Criteria, and Privacy Policy.

    Trojans like ObliqueRAT may add entries to the system Startup in order to start operating as soon as the system launches. If there are such entries on your computer, they have to be deactivated. To do that, type msconfig in the windows search field and hit enter.  You should see the System Configuration window on your screen:


    Go to the Startup tab and see the list of entries that have checkmarks. Look for entries with “Unknown” Manufacturer as well as other suspicious apps that might have a relation to ObliqueRAT and remove their checkmark. Then, click Ok to confirm the changes.

    If, by any chance, you have a reason to suspect that some other threat (such as ransomware or some other malware) is secretly operating on your computer, or the machine is hacked, do the following:

    Use the Start and R key combination from the keyboard to open a Run box. Then, copy the command below in the Run box: 

    notepad %windir%/system32/Drivers/etc/hosts

    Click on the OK button. A file named Hosts will immediately open on the screen. Scroll the file and go to Localhost. If you see a lot of questionable-looking IP addresses below Localhost, then this might indicate that your computer is hacked. See the image below:

    hosts_opt (1)

    Attention! Drop us a message in the comments below this post if you detect questionable IPs below “Localhost” so we can tell you if the IPs you have found are malicious.


    The final step of the removal of ObliqueRAT involves deleting the Trojan’s entries from the Registry. For this task, you need to open the Registry Editor (type Regedit in the windows search field and press Enter) and then use the Find function to search for trojan-related entries by its name.

    To open the Find function,  press the CTRL and F keys from the keyboard together. Then, type the Name of the virus and then click on the Find Next button.

    When the search completes, delete any entries that are found by right-clicking on them. 

    Attention! You may have to repeat the search by typing the Trojan’s name as many times as needed until no more results are found.

    To ensure that there are no more hidden scripts of ObliqueRAT in the Registry after you are done with the search, we advise you to go manually to the following directories and delete them:

    • HKEY_CURRENT_USER/Software/Random Directory
    • HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Run/Random
    • HKEY_CURRENT_USER/Software/Microsoft/Internet Explorer/Main/Random

    Important! Any deletions or changes in the Registry that are unrelated to the Trojan may cause damage to the entire operating system. Be very careful and if you are not sure about what needs to be deleted, you better use a professional removal tool to avoid an unintentional corruption of the OS. 


    About the author


    Brandon Skies

    Brandon is a researcher and content creator in the fields of cyber-security and virtual privacy. Years of experience enable him to provide readers with important information and adequate solutions for the latest software and malware problems.

    Leave a Comment

    We are here to help! Use SpyHunter to remove malware in under 15 minutes.

    Not Your OS? Download for Windows® and Mac®.

    * See Free Trial offer details and alternative Free offer here.

    ** SpyHunter Pro receives additional removal definitions and manual fixes through its HelpDesk in cases where they are needed.

    Spyware Helpdesk 1