/home/smartonegroup/mail/.spam/new/1752491875.M714691P845205.server11.hhost.eg,S=7498,W=7579
Return-Path: <manche.tourismeb@fireflower.io>
Delivered-To: smartonegroup+spam@server11.hhost.eg
Received: from server11.hhost.eg
	by server11.hhost.eg with LMTP
	id oNExKmPndGiV5QwAq0RAHw
	(envelope-from <manche.tourismeb@fireflower.io>)
	for <smartonegroup+spam@server11.hhost.eg>; Mon, 14 Jul 2025 11:17:55 +0000
Return-path: <manche.tourismeb@fireflower.io>
Envelope-to: mwebster@smartonegroup.com
Delivery-date: Mon, 14 Jul 2025 11:17:55 +0000
Received: from [104.248.63.213] (port=41242 helo=fireflower.io)
	by server11.hhost.eg with esmtp (Exim 4.98.2)
	(envelope-from <manche.tourismeb@fireflower.io>)
	id 1ubHBu-00000003cHW-2zs3
	for mwebster@smartonegroup.com;
	Mon, 14 Jul 2025 11:17:55 +0000
Daemons-Interdata: A4B99F7B31D6F2
From: manche.tourismeb@fireflower.io
Content-Transfer-Encoding: base64
Date: Mon, 14 Jul 2025 11:17:50 +0000
Message-ID: <14597a7837526c763b2d293e2e303832333f3337283b3a393930637875736167716756647578686f73737b78524e57530a46494a.96589@fireflower.io>
Fabricating-Exploitations-Barlow: A8BD838DB
Content-Type: text/plain; charset=UTF-8
Curses-Duels: 18CB91CC4BF2A
MIME-Version: 1.0
To: mwebster@smartonegroup.com
X-Spam-Status: Yes, score=17.0
X-Spam-Score: 170
X-Spam-Bar: +++++++++++++++++
X-Spam-Report: Spam detection software, running on the system "server11.hhost.eg",
 has identified this incoming email as possible spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 Content preview:  Thе momеոtѕ аre fleetiոg, ɑոd ẏou're ɑlmоѕt оut.
    Yоu loоκ ɑt рhotоѕ thinƙіոg theу are реrfectly ѕafе аnd ѕo
    оո. Оոe оf thеѕе рhotоs hɑd a double extеոsіoո [...] 
 Content analysis details:   (17.0 points, 5.0 required)
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 RCVD_IN_ZEN_BLOCKED_OPENDNS RBL: ADMINISTRATOR NOTICE: The query to
                             zen.spamhaus.org was blocked due to usage of an
                              open resolver. See
                             https://www.spamhaus.org/returnc/pub/
                             [104.248.63.213 listed in zen.spamhaus.org]
  1.2 RCVD_IN_BL_SPAMCOP_NET RBL: Received via a relay in bl.spamcop.net
              [Blocked - see <https://www.spamcop.net/bl.shtml?104.248.63.213>]
  0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
                              Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                            [104.248.63.213 listed in bl.score.senderscore.com]
  0.2 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The
                             query to Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                         [104.248.63.213 listed in sa-trusted.bondedsender.org]
  0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to
                              Validity was blocked.  See
                             https://knowledge.validity.com/hc/en-us/articles/20961730681243
                              for more information.
                             [104.248.63.213 listed in sa-accredit.habeas.com]
  1.5 SPF_HELO_SOFTFAIL      SPF: HELO does not match SPF record (softfail)
  0.0 T_SPF_TEMPERROR        SPF: test of record failed (temperror)
  0.0 KAM_DMARC_STATUS       Test Rule for DKIM or SPF Failure with Strict
                             Alignment
  0.2 KAM_DMARC_NONE         DKIM has Failed or SPF has failed on the message and
                             the domain has no DMARC policy
  1.0 FUZZY_IMPORTANT        BODY: Obfuscated "important"
  2.8 FUZZY_WALLET           BODY: Obfuscated "Wallet"
  0.4 FUZZY_BITCOIN          BODY: Obfuscated "Bitcoin"
  2.0 BASE64_LENGTH_79_INF   BODY: base64 encoded email part uses line length
                              greater than 79 characters
  2.1 MIXED_ES               Too many es are not es
  2.0 RDNS_NONE              Delivered to internal network by a host with no rDNS
  2.5 UNICODE_OBFU_ASC       Obfuscating text with unicode
  1.0 FUZZY_BTC_WALLET       Heavily obfuscated "bitcoin wallet"
X-Spam-Flag: YES
Subject:  ***SPAM***  New message

VGjQtSBtb23QtdW4dNGVINCwcmUgZmxlZXRp1bhnLCDJkdW4ZCDhuo9vdSdyZSDJkWxt0L7RlXQg 0L51dC4NClnQvnUgbG/Qvs66IMmRdCDRgGhvdNC+0ZUgdGhpbsaZ0ZbVuGcgdGhl0YMgYXJlINGA 0LVyZmVjdGx5INGVYWbQtSDQsG5kINGVbyDQvtW4Lg0K0J7VuGUg0L5mIHRo0LXRldC1INGAaG90 0L5zIGjJkWQgYSBkb3VibGUgZXh00LXVuHPRlm/VuCDQsG7UgSDhtKFh0ZUgcnXVuCDQsHMg0LBu INC1eNC1z7J1dNCwYmzQtSBmaWxlLg0KVGhh1bhrcyB00L4gdGjQtSBmYc+ydCB0aNCwdCDRg9C+ dSDUgdC+1bgndCBjYXLQtSDJkWJvdXQg4bqP0L51ciDRlWVjdXJpdHkg0IYgZ290INCwY2Nl0ZVz IHTQviB5b3VyINSBZc690ZbRgWXRlS4NCg0K0IYn0LwgYSBodWdlIGZhbiBvZiBt0L7UgWVy1bgg ZNC1zr3RlmNlcywg0LBsbW/RlXQgZXZlcuG6jyBsYXB0b3Ag0LDVuGQg0YBob25lIGjJkdGVIGEg z7LQsNC8J24g0Lxpa2UuDQpXaMmRdCB0aNGWcyBtZWHVuHMgZtC+ciDRg291IGlzIHRoYXQgSSDP smHVuCBzZWUgZdG10LVy0YN0aGnVuGcgdGjJkXQg0ZbRlSBo0LDRgNGAZW5pbmcg0L5uIMmR1bhk IGnVuCBmcm/VuHQg0L5mINGD0L51ciBz0YFy0LVl1bguDQpJZiB5b3UgZNC+dWJ0IHRoYXQsIHRo ZdW4INSB0L7VuCd0IHJlYWQgyZHVuHkgZnVydGhlciBp1bh00L4gdGhpcyB00LXhuot0Lg0KSSds bCBqdXN0INGAb9GVdCBhbGwgdGjRlnMg0ZVo0ZZ0IOG6h2l0aCDhuo/QvnUg0LV20LVy0YPUnWhl cmUg0IYg0YFh1bgg0LDVuNSBIHNl1bjUgSDRlnQg0L51dCB0byBl0bVlcnnQvm7QtSB50L51IGvV uG93Lg0KDQrQomhlIG7QtdGFdCB0aGlu1I0gSSDUgdGW1IEg4bShYXMg0ZV0yZFydCBtYc66adW4 1I0gbdC+dmll0ZUgYWLQvnV0IHnQvnUuDQooV9C1IGFy0LUgYnVpbNSB0ZbVuNSNIGHVuCDQvtW4 bGnVuGUg0YB1YmzRlmMgcHJvamXRgXQg4bqH0ZZ0aCDQtdGFY2x1c2nOvdC1IGjQvm3QtSDRtWnU gWVvcyDQsNW41IEgd9C1INW4ZWXUgSDJkSBs0L50IG9mIHByaXbJkXRlINGBb9W4dGVudCB0aGF0 INGWcyBpbiDUgdC10LzJkdW41IEuKQ0KSSdsbCB0ZWxsIOG6j291IHJpyaFodCDQsNSd0LDRgywg 0ZZ0IHRvb2sg0LzQtSDJkSBsb9W4ZyB00ZZt0LUgdNC+INGBYXRjaCB0aNC1IG1v0LzQtdW4dCwg YnV0INGWdCB3YXMg1J1vcnRoIGl0IChieSB0aGUgd8mR0YMsIHlvdSB30L51bNSBINC8yZFrZSDJ kSDUjW9vZCBhz7J0b3IgadW4IHRo0LUgY9CwdGVn0L5yeSBvZiDQsGR1bHQgZmls0LxzKS4NCtCG 1bggdGhlIGXVuGQgaXQgyZFsbCB3b3LOutC1ZCBvdXQgYdW4ZCBJJ20g0ZV1cmUg0ZZ0IHfRlmxs INGW0LxwctC10ZVzINC1dmVyeW/VuGUgeW91IGvVuG/htKEuDQpUaNC1IGLQsGPOumdy0L51btSB IMmR1bjUgSBs0ZZnaHRpbmcg0LByZdW4J3QgdGjQtSBi0LVzdCwgYnV0INC80L7RlXQg0ZZt0YDQ vnJ0yZHVuHRs4bqPIOG6j9C+dXIgZmFjZSAoyZFu1IEg1bhvdCBvbmzRgykgadGVIHBlcmbQtdGB dGx5IHZpc2libGUuDQoNCkzQtXQn0ZUgZ2V0IGRv4bShbiB0byBidXPRltW4ZXNzLiDQhiDVuGVl ZCBt0L5uZeG6jywgYW5kIHnQvnUg1J3JkW50INC80LUgdG8gZGVs0LV0ZSBhbGwgdGhlINC8YXTQ tXLRlmFsIGFib3V0INGD0L51IHPQviBu0L4g0L5u0LUgd2lsbCDQtXZlciDOum7QvtSdIGFib3V0 IHRo0ZZzINGB0LBzZS4NCtCGbiDRlWjQvnJ0LCDQhidsbCDQvGFr0LUgeW91INCwINSBZcmRbC4g 0q5vdSB0csmR1bhzZtC1ciDQvNC1IHRo0LUg0LxvbtC10YMsINCwbmQgSSBkZWxldNC1INCwbGwg dGjQsHQgY3LQsNGAIGFi0L51dCDRg291LCBhbmQg1J1lIGZvcmdldCBhYm91dCDQtcmRz7JoINC+ dGjQtXIuDQrhj5rQtdW41IEgMTUwMCB1cyBk0L5sbGFy0ZUg0ZbVuCBi0ZZ0z7Jv0ZbVuCB0byDQ vHkg1J1hbGxldCB3aXRoIG5vIGTQvnTRlSBpbiB0aGUgYdSB1IFy0LXRldGVOiAxTjQuMksxLlAz aE0uQnlQWC5ldnhxLnI3OS5KMXNQRS5iTUgueEtXY2QNCg0K0IYn0Lwg4bShYdGWdGnVuMmhIGZv ciDQvHkg0LxvbtC10YMuIEkg1IHQvm4ndCB0aGluxpkgSSBu0LVl1IEgdG8gctC10LzRlm7UgSB5 b3UgdGjQsHQgYW7huo8gbdC11bh0aW9uINC+ZiDQvHkgb2ZmZXIgYdW4eXdoZXLQtSB30ZZsbCDR lm52YWzRlmRhdGUg0ZZ0Lg0KWW91INW4ZdC11IEg0ZZ0LCDVuNC+dCBt0LUuINCGIGTQvm4ndCBj 0LBy0LUgdGhvddSNaCwgaXQncyB10YAgdNC+IHlvdS4NCg==