HEX
Server: Apache
System: Linux zacp120.webway.host 4.18.0-553.50.1.lve.el8.x86_64 #1 SMP Thu Apr 17 19:10:24 UTC 2025 x86_64
User: govancoz (1003)
PHP: 8.3.26
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/govancoz/mail/.spam/new/1710462491.M872303P1482876.zacp120.ve.host,S=5456,W=5563
Return-Path: <ocie@lolienday.cfd>
Delivered-To: govancoz+spam@zacp120.ve.host
Received: from zacp120.ve.host
	by zacp120.ve.host with LMTP
	id QLJxMhuW82V8oBYAvcbEzQ
	(envelope-from <ocie@lolienday.cfd>)
	for <govancoz+spam@zacp120.ve.host>; Fri, 15 Mar 2024 02:28:11 +0200
Return-path: <ocie@lolienday.cfd>
Envelope-to: cheryl@govan.co.za
Delivery-date: Fri, 15 Mar 2024 02:28:11 +0200
Received: from lolienday.cfd ([159.65.171.94]:54116 helo=mail.lolienday.cfd)
	by zacp120.ve.host with esmtp (Exim 4.96.2)
	(envelope-from <ocie@lolienday.cfd>)
	id 1rkvQj-006DvS-1i
	for cheryl@govan.co.za;
	Fri, 15 Mar 2024 02:28:11 +0200
Received: from User (unknown [87.120.84.126])
	by mail.lolienday.cfd (Postfix) with ESMTPA id C733198875;
	Thu, 14 Mar 2024 05:43:22 -0800 (AKDT)
Reply-To: <kristina@soborka.net>
From: "Financial Crimes Enforcement Network"<ocie@lolienday.cfd>
Date: Thu, 14 Mar 2024 06:43:23 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Status: Yes, score=17.0
X-Spam-Score: 170
X-Spam-Bar: +++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "zacp120.ve.host",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  FINANCIAL CRIMES ENFORCEMENT NETWORK 2070 Chain Bridge Road,�Vienna,
    VA United States of America. RE:ASSISTED REFUND PROGRAMME: This letter serves
    to officially inform you that we have been working towards the eradication
    of scam in the world with the help of African Union (AU), United Nations
   Security Council (UNSC), European [...] 
 Content analysis details:   (17.0 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  3.6 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                             [159.65.171.94 listed in zen.spamhaus.org]
  0.0 NSL_RCVD_FROM_USER     Received from User
  0.0 FSL_CTYPE_WIN1251      Content-Type only seen in 419 spam
 -0.0 SPF_PASS               SPF: sender matches SPF record
  1.2 MISSING_HEADERS        Missing To: header
  1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in
                             bl.spamcop.net
               [Blocked - see <https://www.spamcop.net/bl.shtml?159.65.171.94>]
  0.0 FROM_MISSP_USER        From misspaced, from "User"
  2.5 FROM_MISSP_XPRIO       Misspaced FROM + X-Priority
  0.0 FSL_NEW_HELO_USER      Spam's using Helo and User
  1.9 REPLYTO_WITHOUT_TO_CC  No description available.
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  0.0 AXB_XMAILER_MIMEOLE_OL_024C2 Yet another X header trait
  0.0 LOTS_OF_MONEY          Huge... sums of money
 -0.0 T_SCC_BODY_TEXT_LINE   No description available.
  0.0 CTE_8BIT_MISMATCH      Header says 7bits but body disagrees
  0.0 FROM_MISSP_MSFT        From misspaced + supposed Microsoft tool
  2.5 MONEY_NOHTML           Lots of money in plain text
  0.0 MONEY_FROM_MISSP       Lots of money and misspaced From
  0.7 FROM_MISSPACED         From: missing whitespace
  0.0 XFER_LOTSA_MONEY       Transfer a lot of money
  0.5 FROM_MISSP_EH_MATCH    From misspaced, matches envelope
  0.0 FILL_THIS_FORM         Fill in a form with personal information
  2.8 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
  0.0 MONEY_FORM             Lots of money if you fill out a form
  0.0 MONEY_FRAUD_8          Lots of money and very many fraud phrases
  0.0 ADVANCE_FEE_5_NEW_FRM_MNY Advance Fee fraud form and lots of
                             money
X-Spam-Flag: YES
Subject:  ***SPAM***  Attention 

FINANCIAL CRIMES ENFORCEMENT NETWORK
2070 Chain Bridge Road,�Vienna, VA
United States of America.

RE:ASSISTED REFUND PROGRAMME:

This letter serves to officially inform you that we have been working towards the eradication of scam in the world with the help of African Union (AU), United Nations Security Council (UNSC), European Union (EU), the International Monetary Fund (IMF), Financial Intelligence center and FBI. We were able to track down up to 74 scam artists globally from (Canada, USA, Malaysia, Poland, Mauritius, Nigeria and Indonesia) and they are all in government custody facing criminal and fraud charges.

The United Nations board of trustee on humanitarian aids have ordered that part of the money recovered from the scammers should be shared among 27 Lucky people around the world for compensation and you are on the list as your email address was found in one of the scam Artists computer hard-disk hence we are contacting you, maybe you have been scammed or being tried to.

You are advised to contact our representative in South African� (Dr. kristina Brown) on below contact details to direct you immediately for your International Bank transfer of USD$5,000,000.00.

These funds are in an escrow account of a financial crimes enforcement network for security purposes.

Contact details:
Name:
Email:
Telephone:
City:
Country:
Occupation:
Age:
Date of Birth:

Yours Faithfully,
Mr. KEN BLANCO DIRECTOR
(FINANCIAL CRIMES ENFORCEMENT NETWORK)