From: Новое в валютном регулировании <multiprocessingbk85@royalpalaces.com>
Date: Thu, 29 Dec 2011 17:50:58 -0600
Subject: ****SPAM**** ЦБ РФ О формах учета по валютным операциям

Spam detection software, running on the system "s15340946.onlinehome-server.info", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
postmaster for details.

Content preview: бмхлюмхч аюмйнб, тхмюмянбшу, ярпюунбшу йнлоюмхи - мнбше хглемемхъ
бярсохкх б яхкс мНБНЕ Б ЯХЯРЕЛЕ БЮКЧРМНЦН ПЕЦСКХПНБЮМХЪ Х БЮКЧРМНЦН ЙНМРПНКЪ
бЮКЧРМНЕ ПЕЦСКХПНБЮМХЕ (жа пт) 7 (499) вв539/68 +7 495 742.9I.98 [...]


Content analysis details: (60.4 points, 7.0 required)

pts rule name description
---- ---------------------- --------------------------------------------------
31 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL
[186.24.21.3 listed in zen.spamhaus.org]
0.5 RCVD_IN_PBL RBL: Received via a relay in Spamhaus PBL
4.4 HELO_DYNAMIC_IPADDR2 Relay HELO'd using suspicious hostname (IP addr
2)
0.5 FH_HELO_EQ_D_D_D_D Helo is d-d-d-d
1.1 RCVD_IN_SORBS_WEB RBL: SORBS: sender is a abuseable web server
[186.24.16.5 listed in dnsbl.sorbs.net]
21 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
[Blocked - see ]
0.0 HTML_MESSAGE BODY: HTML included in message
1.8 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars
0.1 RDNS_NONE Delivered to trusted network by a host with no rDNS

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.


<
28621/36003
>
© 2009 megahaus.eu