Malware
Q | C | Q | R | I | O | K | J | K | B | T | C | N | M | T | A | J |
C | M | Q | C | U | W | G | T | E | C | C | T | X | K | H | F | D |
S | T | S | K | G | X | J | O | R | B | O | U | J | D | H | M | Y |
U | D | L | O | D | T | E | E | A | C | R | Y | O | M | T | Q | E |
R | O | P | O | F | P | S | N | W | Q | O | Q | L | R | E | K | T |
I | Y | M | K | G | O | R | L | Y | H | I | L | W | O | R | L | N |
V | W | K | R | K | J | O | L | P | B | R | K | I | W | A | F | E |
C | R | D | A | O | J | H | G | S | R | F | B | K | R | W | J | X |
L | T | J | N | D | X | N | I | U | X | F | H | H | W | D | O | A |
M | D | S | S | H | G | A | G | P | J | N | T | A | P | A | Q | I |
X | T | L | O | E | E | J | W | L | R | D | Q | J | R | U | X | Y |
V | H | R | M | F | J | O | Y | G | N | W | V | L | R | V | H | T |
I | X | C | W | A | A | R | G | T | F | N | F | A | H | J | O | D |
D | H | E | A | W | A | T | V | W | T | A | Y | O | E | E | R | L |
Y | C | N | R | Q | T | V | O | G | R | F | M | T | N | K | E | I |
F | D | D | E | R | H | G | J | G | I | W | D | X | U | R | O | I |
I | C | T | Q | O | X | U | C | N | E | P | A | B | L | N | C | K |
Clues
- copies itself and spreads when an infected file is opened (5)
- copies itself through a network (4)
- locks your computer and holds it hostage. (10)
- presents itself as unwanted advertisements. (6)
- pretends to be a trusted link. (6, 5)
- secretly tracks your activity. (7)
Comments
Report