| Trojan | Description | Size | Pic |
| Dewin (b) | Remote Access | 35 | Y |
| Dewin (c) | Remote Access | 45 | Y |
| Dewin (e) | Remote Access | 40 | Y |
| Dewin (f) | Remote Access | 35 | Y |
| Dewin (g) | Remote Access | 45 | Y |
| Dewin (i) | Remote Access | 45 | Y |
| Dewin (j) | Remote Access | 35 | Y |
| Dewin (k) | Remote Access | 46 | Y |

Copyright� MegaSecurity.org