↩ back to the box
Spam detection software, running on the system "mail-server.costarusa.ru", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
y for details.

Content preview: This is HTML source of message you composed. Do not modify
here. To modify this message press HTML Messages Editor button. Shenzhen
International Branch Shenzhen.518048. [...]

Content analysis details: (6.3 points, 5.0 required)

pts rule name description
---- ---------------------- --------------------------------------------------
0.0 HTML_MESSAGE BODY: HTML included in message
0.0 BAYES_50 BODY: Bayesian spam probability is 40 to 60%
[score: 0.5360]
1.5 MIME_HTML_ONLY BODY: Message only has text/html MIME parts
0.0 FORGED_OUTLOOK_TAGS Outlook can't send HTML in this format
0.8 MSOE_MID_WRONG_CASE MSOE_MID_WRONG_CASE
0.0 FORGED_OUTLOOK_HTML Outlook can't send HTML message only
0.8 SHORT_HELO_AND_INLINE_IMAGE Short HELO string, with inline image
0.1 RDNS_NONE Delivered to trusted network by a host with no rDNS
3.1 FORGED_MUA_OUTLOOK Forged mail pretending to be from MS Outlook

The original message was not completely plain text, and may be unsafe to
open with some email clients; in particular, it may contain a virus,
or confirm that your address can receive spam. If you wish to view
it, it may be safer to save it to a file and open it with an editor.