Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Feb 14, 2024 | Updated Oct 15, 2025

Trojan:Win32/VenomRat.RPX!MTB

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Trojan:Win32/VenomRat.RPX!MTB is a malicious remote access trojan (RAT) which was first reported in June 2020. It has been advertised on hacker forums to gain remote access to Windows devices. It operates as a full-featured information-stealing trojan. The primary infection vector is the use of maliciously crafted Microsoft Excel files being distributed via spam email that uses obfuscated macros to retrieve the final payload. The trojan has the ability, once installed, to steal credentials, hijack cryptocurrency wallets, change system services, such as Remote Desktop Protocol (RDP), and in some variants, encrypt files to ask for ransom. 

The “!MTB” suffix refers to Machine Threat Behavior, which indicates that this trojan was detected using behavioral analysis or machine learning models. Instead of relying on a static signature (like a known file hash), the antivirus engine identified the program's actions, sequence of operations, or code patterns as malicious. These patterns are consistent with the known behavior of the "VenomRat" family. 

  • Unplug the Ethernet cable or disable Wi-Fi to prevent the malware from communicating with its C2 servers and exfiltrating your data. 
  • Check for and end task the processes ijii.exe and Windows.Gaming.Preview.exe in the Task Manager. 
  • Delete the ijii.exe file from the %AppData% folder and remove the scheduled task named Windows.Gaming.Preview. 
  • Remove the "Venom" user account and revert to any unauthorized RDP and firewall setting changes. 
  • Check the AppInit_DLLs registry key and remove references to r77-x86.dlland r77-x64.dll. 

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us