More order Spam from Comcast

From - Fri Apr 26 08:59:31 2013

X-Account-Key: account1

X-UIDL: 0000171d4f5d9180

X-Mozilla-Status: 0001

X-Mozilla-Status2: 00000000

X-Mozilla-Keys:

X-AVG: Scanning

X-AVG: Scanning

Return-Path:

X-Original-To: dave@doctor.nl2k.ab.ca

Delivered-To: dave@doctor.nl2k.ab.ca

Received: from ns3.nettpro-dns.net (ns3.nettpro-dns.net [89.221.244.203])

(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))

(No client certificate requested)

by doctor.nl2k.ab.ca (Postfix) with ESMTPS id 7CBB012CFABF

for ; Thu, 25 Apr 2013 17:50:27 -0600 (MDT)

Received: from 173-160-130-26-washington.hfc.comcastbusiness.net ([173.160.130.26]:2317 helo=User)

by ns3.nettpro-dns.net with esmtpa (Exim 4.80)

(envelope-from )

id 1UVVvM-0002f5-JH; Fri, 26 Apr 2013 01:50:08 +0200

Reply-To:

From: "Yachong trading Co"

Subject: NEW ORDER

Date: Thu, 25 Apr 2013 16:46:31 -0700

MIME-Version: 1.0

Content-Type: multipart/mixed;

boundary="----=_NextPart_000_00CE_01C2A9A6.29557CE6"

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2600.0000

X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

X-AntiAbuse: This header was added to track abuse, please include it with any abuse report

X-AntiAbuse: Primary Hostname - ns3.nettpro-dns.net

X-AntiAbuse: Original Domain - doctor.nl2k.ab.ca

X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]

X-AntiAbuse: Sender Address Domain - gmail.com

X-Get-Message-Sender-Via: ns3.nettpro-dns.net: authenticated_id: post@webfront.no

X-Source:

X-Source-Args:

X-Source-Dir:

X-Virus-Scanned: clamav-milter 0.97.8-exp-debug at doctor.nl2k.ab.ca

X-Virus-Status: Clean

X-Antivirus: AVG for E-mail 10.0.1432 [3162/5774]

X-AVG-ID: ID4DE6F85C-2EE868BD

X-Brightmail-Tracker: AAAABBrot4ERrD9lHXpLZx16S4A=

X-Brightmail-Tracker: AAAAAA==



This is a multi-part message in MIME format.



------=_NextPart_000_00CE_01C2A9A6.29557CE6

Content-Type: text/plain;

charset="Windows-1251"

Content-Transfer-Encoding: 7bit



Hello,



Our customer has decided to place a trial order and after confirming your quality, will place a bigger order subsequently.However, we look forward doing good business with you in the nearest future.Provide give me rock bottom price and send final quote/Proforma Invoice immediately.



Regards,



Kenny Chen

International Trade Manager

Yachong trading Co



------=_NextPart_000_00CE_01C2A9A6.29557CE6

Content-Type: multipart/alternative;

boundary="=======AVGMAIL-297229B6======="



--=======AVGMAIL-297229B6=======

Content-Type: text/plain; x-avg=cert; charset="Windows-1251"

Content-Transfer-Encoding: quoted-printable

Content-Disposition: inline

Content-Description: "Certification"



-----

Viruses found in the attached files.

* PO.zip: Trojan horse Generic32.CBEF. The attachment was moved to the V=

irus Vault.



Checked by AVG - www.avg.com

Version: 10.0.1432 / Virus Database: 3162/5774 - Release Date: 04/26/13=



--=======AVGMAIL-297229B6=======--



------=_NextPart_000_00CE_01C2A9A6.29557CE6

Content-Type: multipart/alternative;

boundary="=======AVGMAIL-5EE4C958======="



--=======AVGMAIL-5EE4C958=======

Content-Type: text/plain; x-avg=cert; charset="Windows-1251"

Content-Transfer-Encoding: quoted-printable

Content-Disposition: inline

Content-Description: "Certification"



-----

No virus found in this message.

Checked by AVG - www.avg.com

Version: 10.0.1432 / Virus Database: 3162/5774 - Release Date: 04/26/13=



--=======AVGMAIL-5EE4C958=======--



------=_NextPart_000_00CE_01C2A9A6.29557CE6--





.



Trackbacks

Trackback specific URI for this entry

This link is not meant to be clicked. It contains the trackback URI for this entry. You can use this URI to send ping- & trackbacks from your own blog to this entry. To copy the link, right click and select "Copy Shortcut" in Internet Explorer or "Copy Link Location" in Mozilla.

No Trackbacks

Comments

Display comments as Linear | Threaded

No comments

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA