We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Win32/Hikiti
Aliases: Backdoor/Win32.Fexel (AhnLab) BackDoor.Generic17.BMEA (AVG) Trojan.Click3.677 (Dr.Web) BackDoor-FBFU!7BF1E0FF1E90 (McAfee) Backdoor.Fexel (Symantec)
Summary
Microsoft security software detects and removes this family of threats.
These threats connect to a remote server and wait for instructions from a malicious hacker. This can include instructions to download other malware, or collect information about your PC.
They can be downloaded by other malware, including Win32/Mdmbot, Win32/Moudoor, Win32/Plugx, Win32/Sensode, and Win32/Derusbi. They can also be installed when you visit a hacked or malicious website.
Use the following free Microsoft software to detect and remove this threat:
- Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for Windows 7 and Windows Vista
- Microsoft Safety Scanner
- Microsoft Windows Malicious Software Removal Tool
You should also run a full scan. A full scan might find other, hidden malware.
Get more help
You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.
If you’re using Windows XP, see our Windows XP end of support page.