Trojan | Description | Size | Pic |
Helios 1.2b | Remote Access | 252 | Y |
Helios 1.2d | Remote Access | 255 | Y |
Helios 1.3e | Remote Access | 258 | Y |
Helios 1.4 | Remote Access | 260 | Y |
Helios 1.5 | Remote Access | 273 | Y |
Helios 1.6 | Remote Access | 275 | Y |
Helios 1.7 | Remote Access | 450 | Y |
Helios 1.8 | Remote Access | 450 | Y |
Helios 2.0 | Remote Access | 461 | Y |
Helios 2.1 | Remote Access | 288 | Y |
Helios 2.2 | Remote Access | 301 | Y |
Helios 2.4 | Remote Access | 434 | Y |
Helios 2.5 | Remote Access | 388 | Y |
Helios 2.6 | Remote Access | 398 | Y |
Helios 3.0 | Remote Access | 700 | Y |
Helios 3.0 (b) | Remote Access | 39 | Y |
Helios 3.1 | Remote Access | 700 | Y |
Helios 4.08-LE | Remote Access | 388 | Y |
Helios 4.10-LE | Remote Access | 381 | Y |
Helios Bot 1.0 | Remote Access | 14 | Y |
Helios Bot 1.1 | Remote Access | 5 | Y |
Copyright� MegaSecurity.org