安装 Steam
登录
|
语言
繁體中文(繁体中文)
日本語(日语)
한국어(韩语)
ไทย(泰语)
български(保加利亚语)
Čeština(捷克语)
Dansk(丹麦语)
Deutsch(德语)
English(英语)
Español-España(西班牙语 - 西班牙)
Español - Latinoamérica(西班牙语 - 拉丁美洲)
Ελληνικά(希腊语)
Français(法语)
Italiano(意大利语)
Bahasa Indonesia(印度尼西亚语)
Magyar(匈牙利语)
Nederlands(荷兰语)
Norsk(挪威语)
Polski(波兰语)
Português(葡萄牙语 - 葡萄牙)
Português-Brasil(葡萄牙语 - 巴西)
Română(罗马尼亚语)
Русский(俄语)
Suomi(芬兰语)
Svenska(瑞典语)
Türkçe(土耳其语)
Tiếng Việt(越南语)
Українська(乌克兰语)
报告翻译问题

strictly confidentialIt gives me a great deal of pleasure to write you this mail and even when it might come to you as a surprise. My name is Paul Kunert. I am a client services manager with a bank here in Europe. I would like to use this medium to ask your assistance.
I have in the course of my duties come in contact with an account that has been inactive for some years now and a careful investigation proved the depositor of the funds died five years ago. All attempts to reach the supposed beneficiary of the deposit were fruitless and before it is forfeited to the state, can you assume next of kin? I look forward to hearing from you.
Respectfully yours, Paul Kunert
Apparently one of its functions is turning the host into a slave similar to a vnc. Translated: the hacker can access your computer screen and control the computer if he decides to do so. Other functions include spyware background processes and information stealers.