HEX
Server: Apache
System: Linux zacp120.webway.host 4.18.0-553.50.1.lve.el8.x86_64 #1 SMP Thu Apr 17 19:10:24 UTC 2025 x86_64
User: govancoz (1003)
PHP: 8.3.26
Disabled: exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Upload Files
File: /home/govancoz/mail/.spam/new/1710401375.M39307P857174.zacp120.ve.host,S=5278,W=5382
Return-Path: <ocie@lolienday.cfd>
Delivered-To: govancoz+spam@zacp120.ve.host
Received: from zacp120.ve.host
	by zacp120.ve.host with LMTP
	id eLHuAF+n8mVWFA0AvcbEzQ
	(envelope-from <ocie@lolienday.cfd>)
	for <govancoz+spam@zacp120.ve.host>; Thu, 14 Mar 2024 09:29:35 +0200
Return-path: <ocie@lolienday.cfd>
Envelope-to: cheryl@govan.co.za
Delivery-date: Thu, 14 Mar 2024 09:29:35 +0200
Received: from lolienday.cfd ([159.65.171.94]:57940 helo=mail.lolienday.cfd)
	by zacp120.ve.host with esmtp (Exim 4.96.2)
	(envelope-from <ocie@lolienday.cfd>)
	id 1rkfWx-003b04-1q
	for cheryl@govan.co.za;
	Thu, 14 Mar 2024 09:29:34 +0200
Received: from User (unknown [87.120.84.126])
	by mail.lolienday.cfd (Postfix) with ESMTPA id A857684256;
	Wed, 13 Mar 2024 20:15:29 -0800 (AKDT)
Reply-To: <kristina@soborka.net>
From: "Financial Crimes Enforcement Network"<ocie@lolienday.cfd>
Date: Wed, 13 Mar 2024 21:15:31 -0700
MIME-Version: 1.0
Content-Type: text/plain;
	charset="Windows-1251"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Status: Yes, score=15.9
X-Spam-Score: 159
X-Spam-Bar: +++++++++++++++
X-Spam-Report: Spam detection software, running on the system "zacp120.ve.host",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  FINANCIAL CRIMES ENFORCEMENT NETWORK 2070 Chain Bridge Road,�Vienna,
    VA United States of America. RE:ASSISTED REFUND PROGRAMME: This letter serves
    to officially inform you that we have been working towards the eradication
    of scam in the world with the help of African Union (AU), United Nations
   Security Council (UNSC), European [...] 
 Content analysis details:   (15.9 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 FSL_CTYPE_WIN1251      Content-Type only seen in 419 spam
  0.0 NSL_RCVD_FROM_USER     Received from User
 -0.0 SPF_PASS               SPF: sender matches SPF record
  1.2 MISSING_HEADERS        Missing To: header
  3.6 RCVD_IN_PBL            RBL: Received via a relay in Spamhaus PBL
                             [159.65.171.94 listed in zen.spamhaus.org]
  2.5 FROM_MISSP_XPRIO       Misspaced FROM + X-Priority
  0.0 CTE_8BIT_MISMATCH      Header says 7bits but body disagrees
  1.9 REPLYTO_WITHOUT_TO_CC  No description available.
  0.0 AXB_XMAILER_MIMEOLE_OL_024C2 Yet another X header trait
 -0.0 T_SCC_BODY_TEXT_LINE   No description available.
  0.0 FROM_MISSP_MSFT        From misspaced + supposed Microsoft tool
  0.0 LOTS_OF_MONEY          Huge... sums of money
  0.0 FSL_NEW_HELO_USER      Spam's using Helo and User
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  0.0 FROM_MISSP_USER        From misspaced, from "User"
  0.0 MONEY_FROM_MISSP       Lots of money and misspaced From
  2.5 MONEY_NOHTML           Lots of money in plain text
  0.7 FROM_MISSPACED         From: missing whitespace
  0.0 XFER_LOTSA_MONEY       Transfer a lot of money
  0.6 FROM_MISSP_EH_MATCH    From misspaced, matches envelope
  0.0 FILL_THIS_FORM         Fill in a form with personal information
  2.8 FORGED_MUA_OUTLOOK     Forged mail pretending to be from MS Outlook
  0.0 MONEY_FORM             Lots of money if you fill out a form
  0.0 MONEY_FRAUD_8          Lots of money and very many fraud phrases
  0.0 ADVANCE_FEE_5_NEW_FRM_MNY Advance Fee fraud form and lots of
                             money
X-Spam-Flag: YES
Subject:  ***SPAM***  Attention Sir/Ma

FINANCIAL CRIMES ENFORCEMENT NETWORK
2070 Chain Bridge Road,�Vienna, VA
United States of America.

RE:ASSISTED REFUND PROGRAMME:

This letter serves to officially inform you that we have been working towards the eradication of scam in the world with the help of African Union (AU), United Nations Security Council (UNSC), European Union (EU), the International Monetary Fund (IMF), Financial Intelligence center and FBI. We were able to track down up to 74 scam artists globally from (Canada, USA, Malaysia, Poland, Mauritius, Nigeria and Indonesia) and they are all in government custody facing criminal and fraud charges.

The United Nations board of trustee on humanitarian aids have ordered that part of the money recovered from the scammers should be shared among 27 Lucky people around the world for compensation and you are on the list as your email address was found in one of the scam Artists computer hard-disk hence we are contacting you, maybe you have been scammed or being tried to.

You are advised to contact our representative in South African� (Dr. kristina Brown) on below contact details to direct you immediately for your International Bank transfer of USD$5,000,000.00.

These funds are in an escrow account of a financial crimes enforcement network for security purposes.

Contact details:
Name:
Email:
Telephone:
City:
Country:
Occupation:
Age:
Date of Birth:

Yours Faithfully,
Mr. KEN BLANCO DIRECTOR
(FINANCIAL CRIMES ENFORCEMENT NETWORK)