Trojan | Description | Size | Pic |
Hackarmy (a) | Remote Access | 15 | Y |
Hackarmy (b) | Remote Access | 13 | Y |
Hackarmy (c) | Remote Access | 10 | Y |
Hackarmy (d) | Remote Access | 53 | Y |
Hackarmy (e) | Remote Access | 10 | Y |
Hackarmy (f) | Remote Access | 13 | Y |
Hackarmy (g) | Remote Access | 50 | Y |
Hackarmy (h) | Remote Access | 50 | Y |
Hackarmy (i) | Remote Access | 45 | Y |
Hackarmy (k) | Remote Access | 22 | Y |
Hackarmy (m) | Remote Access | 13 | Y |
Hackarmy (n) | Remote Access | 12 | Y |
Hackarmy (o) | Remote Access | 12 | Y |
Hackarmy (p) | Remote Access | 13 | Y |
Hackarmy (t) | Remote Access | 6 | Y |
Hackarmy (u) | Remote Access | 9 | Y |
Hackarmy (w) | Remote Access | 11 | Y |
Hackarmy (gen) | Remote Access | 20 | Y |
Copyright� MegaSecurity.org