Return-Path: [apukjukpj@unionprint.co.ua]
Received: from unionprint.co.ua ([217.172.183.15]) by mx-ha.gmx.net (mxgmx111) with ESMTP (Nemesis) id 0MEb9p-1ZO42T3L45-00Firl for [contact@succun.su]; Mon, 21 Sep 2015 00:52:48 +0200
Received: from unionprint.co.ua (unknown [94.103.80.24]) by unionprint.co.ua (Postfix) with ESMTPA id 44B08AC0CC0; Sun, 20 Sep 2015 23:24:39 +0300 (EEST)
Message-ID: [apukjukpj11358027.31162712@mail.unionprint.co.ua]
Reply-To: "Apotheke" [apukjukpj@unionprint.co.ua]
From: "Apotheke" [apukjukpj@unionprint.co.ua]
To: [mail@madry.de]
Subject: Testpaket fur 29 euro
Date: Sun, 20 Sep 2015 23:24:40 +0300
MIME-Version: 1.0
Content-Type: multipart/related; type="multipart/alternative"; boundary="----=_NextPart_000_0006_01D0F3FA.ADDD00E0"
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Windows Live Mail 14.0.8117.416
X-MimeOLE: Produced By Microsoft MimeOLE V14.0.8117.416
Envelope-To: [contact@succun.su]
X-GMX-Antispam: 6 (nemesis text pattern profiler); Detail=V3;
X-GMX-Antivirus: 0 (no virus found)
X-UI-Filterresults: junk:10;V01:K0:wU5XLRWBxVk=:MKaiBaHlDWpt1X0VH6svW1aozOAN 1xeIwT0I5/CV822S3GEVwFyqC3g+dIJ+3AH8ug25ZIH8Fcp5EZ5mDfGXSzf+/4s7e1oCNpkEc 6WFlKXyU0phebSrY6oVES7oIlkwJaY9gquxSaLUG2gWxZYoLB6N3074DCs5UtK0CVwrdBnTLs h58/JOfVutdMHH6KXF6eg0mhCV4s3X4IgaUpYCx3y06GRfH6/oY1Z/eLPiGIG+mrJyx6ePttO XZouA2ZxGrJil4YmHGCYG9zKgsYI1XJ/sz4ba1yuUrTWMXjMVXcqL9raASO175EHqHBW9SHgP C5mYpF7WGPt/m1qF+VPG+N1xGcuWX7O30wgX0/TrQWuDcVlOuYxUeYnGJ8Iw0rBZu9w+uB8cZ pvp8tLbEfpJUH5AWbYRBH/ton0NzMZMu59dfXh+8suNyigdSAkRZwNag6pbMuUmBc4GpmxATG +fT03LjsiZZh0AtI4b34/lv4hJcm2mICbe+DyJfwAXCPazRibqdQvFXLUg+f4icSOnJrnJTRG 1EqK+fXRDnHogtvoPhCJelQuFEEFJ5xiQfBlK7Bz7sPwjIeHR8ICnIyfhXhg6pGj+2hQcvLGO kzrm6je9KkF7FBcjQg/wbOSkINqpF5uA94Q+aNhanpmnl6x7eipWUKuV8pUmed91bP7+jnYqn C5sfCfWGI+fS87/kIRqKnX0sRXNFMb6b0hZWy+Ek+CrqbcvFRYumYVW1Q4D+Whh6Xi4Yq+Vsa xSp+z631b6Qo0kkA8sMSLW/Wk4b4S2M/9W87JGCcPx/gyIMlcjEeUhes+tyrv3rOGGU5NciqO FVlLbR6BwiKOMfqfImo14ZfA78EGrcnA5F8YcmZATltRVmaoICe0rLtqhv5wY8kaBpb3w2CVv CHpfBTF2sQu12bQjkduIpppFW5QnOEYiPhgL9Y8CwZ4PbQHD+xACTPC8wi9scbab0XZtVILuP 2QCE2VCVPLEL/WNvMG95wHjPkXUPlMyfblYnpLzVnZj2cPKB0rWUiTRU/O42J8gIL35kJJDJ2 peQw/oS4UTFLyJADW/I2o7crbqdUDIzFFpYIBlQO2D49PkXhAuGYimuXXhCGO06yDzJIxZoGz 78KM+WQ+X20fhY1ut/CLQOxh3ZLUd3r+LGdxF0hwT0WqvdtQrfLbDnS9kOAF+MMfEJePnIc/5 4LEjn0cIUmmmzmJB2VWQgiHhg+0gp481iEEQhNQHmlWvZ0WOh5swOFw2bkCOQeFNakxiWtRNf 8eEFONrfZVMA3raldcDnu5wVaFTYabMXA==
...
db16.pillshab.org
...
[http://www.dapotek.co.ua/db16/index.html]
---------------------------
EDIT (22.09.2015):
Habe den obigen Link heute nochmal durchchecken lassen. Man landet bei der IP-Adresse 103.224.23.216 in Indien, wo zum Zwecke des Phishings die Domains "pillshab.org" und "apothekeohnerezept.com" angesiedelt sind:
Keine Kommentare:
Kommentar veröffentlichen
Hinweis: Nur ein Mitglied dieses Blogs kann Kommentare posten.