安裝 Steam
登入
|
語言
簡體中文
日本語(日文)
한국어(韓文)
ไทย(泰文)
Български(保加利亞文)
Čeština(捷克文)
Dansk(丹麥文)
Deutsch(德文)
English(英文)
Español - España(西班牙文 - 西班牙)
Español - Latinoamérica(西班牙文 - 拉丁美洲)
Ελληνικά(希臘文)
Français(法文)
Italiano(義大利文)
Bahasa Indonesia(印尼語)
Magyar(匈牙利文)
Nederlands(荷蘭文)
Norsk(挪威文)
Polski(波蘭文)
Português(葡萄牙文 - 葡萄牙)
Português - Brasil(葡萄牙文 - 巴西)
Română(羅馬尼亞文)
Русский(俄文)
Suomi(芬蘭文)
Svenska(瑞典文)
Türkçe(土耳其文)
tiếng Việt(越南文)
Українська(烏克蘭文)
回報翻譯問題

strictly confidentialIt gives me a great deal of pleasure to write you this mail and even when it might come to you as a surprise. My name is Paul Kunert. I am a client services manager with a bank here in Europe. I would like to use this medium to ask your assistance.
I have in the course of my duties come in contact with an account that has been inactive for some years now and a careful investigation proved the depositor of the funds died five years ago. All attempts to reach the supposed beneficiary of the deposit were fruitless and before it is forfeited to the state, can you assume next of kin? I look forward to hearing from you.
Respectfully yours, Paul Kunert
Apparently one of its functions is turning the host into a slave similar to a vnc. Translated: the hacker can access your computer screen and control the computer if he decides to do so. Other functions include spyware background processes and information stealers.