| Trojan | Description | Size | Pic |
| Hackarmy (a) | Remote Access | 15 | Y |
| Hackarmy (b) | Remote Access | 13 | Y |
| Hackarmy (c) | Remote Access | 10 | Y |
| Hackarmy (d) | Remote Access | 53 | Y |
| Hackarmy (e) | Remote Access | 10 | Y |
| Hackarmy (f) | Remote Access | 13 | Y |
| Hackarmy (g) | Remote Access | 50 | Y |
| Hackarmy (h) | Remote Access | 50 | Y |
| Hackarmy (i) | Remote Access | 45 | Y |
| Hackarmy (k) | Remote Access | 22 | Y |
| Hackarmy (m) | Remote Access | 13 | Y |
| Hackarmy (n) | Remote Access | 12 | Y |
| Hackarmy (o) | Remote Access | 12 | Y |
| Hackarmy (p) | Remote Access | 13 | Y |
| Hackarmy (t) | Remote Access | 6 | Y |
| Hackarmy (u) | Remote Access | 9 | Y |
| Hackarmy (w) | Remote Access | 11 | Y |
| Hackarmy (gen) | Remote Access | 20 | Y |

Copyright� MegaSecurity.org