| Trojan | Description | Size | Pic |
| Alicia version a | Remote Access | 270 | Y |
| Alicia version b | Remote Access | 217 | Y |
| Alicia version c | Remote Access | 212 | Y |
| Alicia version d | Remote Access | 215 | Y |
| Alicia version e | Remote Access | 221 | Y |
| Alicia version f | Remote Access | 207 | Y |
| Alicia version h | Remote Access | 278 | Y |
| Alicia version i | Remote Access | 293 | Y |
| Alicia version j | Remote Access | 313 | Y |
| Alicia version k | Remote Access | 235 | Y |
| Alicia version l | Remote Access | 235 | Y |
| Alicia version m | Remote Access | 239 | Y |
| Alicia version n | Remote Access | 230 | Y |
| Alicia version o | Remote Access | 234 | Y |
| Alicia version p | Remote Access | 441 | Y |

Copyright� MegaSecurity.org