RSS

Tag Archives: Email Scam

“Erste Group Financial PLC”

LOAN SCAM / ADVANCE FEE FRAUD

 

Subject: FW: LOAN LENDER !!!
From: dlenoir thomasvilleal. com dlenoir@thomasvilleal.com

Dear Sir/Madam,
We lend at 3% ,any interested person should write us with
names,……
address,….
amount,……
purpose of loan,……
duration of loan,…….
occupation,…….
send via Email: erstegroupfinancialltd@msn.com

Best Regard,
Erste Group Financial PLC.

Return-Path: <dlenoir@thomasvilleal.com>
X-Originating-IP: [98.129.35.13]
Authentication-Results: mta1265.mail.bf1.yahoo.com from=; domainkeys=neutral (no sig); from=thomasvilleal.com; dkim=neutral (no sig)
Received: from 127.0.0.1 (EHLO server505.appriver.com) (98.129.35.13)
by mta1265.mail.bf1.yahoo.com with SMTP; Thu, 04 Jul 2013 04:29:41 -0700
X-Note-AR-ScanTimeLocal: 7/4/2013 6:29:40 AM
X-Policy: GLOBAL – thomasvilleal.com
X-Policy: GLOBAL – thomasvilleal.com
X-Policy: GLOBAL – thomasvilleal.com
X-Policy: GLOBAL – thomasvilleal.com
X-Policy: GLOBAL – thomasvilleal.com
X-Policy: Too many policies to list
X-Primary: dlenoir@thomasvilleal.com
X-Note: This Email was scanned by AppRiver SecureTide
X-Virus-Scan: V-
X-Note-SnifferID: 0
X-Note: TCH-CT/SI:0-42/SG:2 7/4/2013 6:28:51 AM
X-GBUdb-Analysis: 0, 98.129.35.1, Ugly c=1 p=-0.961915 Source White
X-Signature-Violations:
0-0-0-1468-c
X-Note-419: 0 ms. Fail:4 Chk:1344 of 1344 total
X-Note: SCH-CT/SI:4-1344/SG:1 7/4/2013 6:29:33 AM
X-Note: Spam Tests Failed:
X-Country-Path: UNKNOWN->UNITED STATES->UNITED STATES
X-Note-Sending-IP: 98.129.35.1
X-Note-Reverse-DNS:
X-Note-Return-Path: dlenoir@thomasvilleal.com
X-Note: User Rule Hits:
X-Note: Global Rule Hits: G319 G320 G321 G322 G326 G327 G434
X-Note: Encrypt Rule Hits:
X-Note: Mail Class: VALID
X-Note: Headers Injected
Received: from [98.129.35.1] (HELO smtp.exg5.exghost.com)
by server505.appriver.com (CommuniGate Pro SMTP 5.4.8)
with ESMTPS id 322704651; Thu, 04 Jul 2013 06:29:40 -0500
Received: from MBX08.exg5.exghost.com ([169.254.1.56]) by
HT07.exg5.exghost.com ([98.129.23.207]) with mapi;
From: dlenoir thomasvilleal.com <dlenoir@thomasvilleal.com>
Subject: FW: LOAN LENDER !!!
Thread-Topic: LOAN LENDER !!!
Thread-Index: AQHOeKnEHqj/sDF0Jka+KYXWC1Sspg==
Message-ID: <76D3239F3747EF4097E4A15E61DAE58012AB3A1231@MBX08.exg5.exghost.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US

 
Leave a comment

Posted by on 07/09/2013 in Other

 

Tags: , , , , , , , , ,

“Precious Johnson”

ONLINE DATING SCAM / 419 SCAM

Precious Johnson also sends out spam mail under the name Precious Weah and Blessing Bouma

Subject: Hello
From: Precious Johnson precious_189_1p

Hello
My name is precious Johnson
i saw your profile today(penpal-net.info) and became interested in you,i will
also like to know you the more,and i want you to send an email to my email
address so i can give you my picture for you to know whom i am.Here is my email
address (preciousjohnson970@yahoo.com)
I believe we can move from here!I am waiting for your mail to my email address
above.
precious
(Remeber the distance or colour does not matter but love matters alot in life)
please contact me here preciousjohnson970@yahoo.com

Return-Path: precious_189_1p88888@libero.it
Received-SPF: pass (domain of libero.it designates 212.52.84.102 as permitted sender)
X-Originating-IP: [212.52.84.102]
Authentication-Results: mta1125.mail.bf1.yahoo.com
Received: from 127.0.0.1 (EHLO outrelay02.libero.it) (212.52.84.102)
by mta1125.mail.bf1.yahoo.com with SMTP; Thu, 20 Jun 2013 23:23:55 -0700
X-CTCH-Spam: Yes
X-CTCH-RefID: str=0001.0A0C0204.51C3F179.002A,ss=1,re=0.000,fgs=0
X-libjamoibt: 1587
Received: from wmail44 (172.31.0.234) by outrelay02.libero.it (8.5.140.03)
id 51589FB60B10153D; Fri, 21 Jun 2013 08:23:53 +0200
Message-ID: <22915950.14955331371795833059.JavaMail.root@wmail44>
From: precious_189_1p <precious_189_1p88888@libero.it>
Reply-To: preciousjohnson970@yahoo.com
Subject: Hello
X-SenderIP: 78.43.46.42
X-libjamv: VDPS5Cfg5x4=
X-libjamsun: iRJlE1l+Vgn9o2jbtAPkptgMKKhmb5lWTBrEynAjbPA=

 
Leave a comment

Posted by on 07/03/2013 in Romance Scam

 

Tags: , , , , , , , , , ,

“Mr. Clay Hodson” a.k.a “Mr. David Gardner”

419 SCAM / ADVANCE FEE FRAUD

This scammer also sends out lottery scams under the name Mr. Ray Collins

Subject: [No Subject]
From: FREE LOTTO
info@freelotto.co.uk

Dear E-mail owner,

Your e-mail is in this week selected online
by FREE LOTTO US as a winner of
US$2,000,000.00. Please contact the
fiduciary officer for your payment.

David Gardner,
E-mail:officeboxun1@kimo.com

Claims Requirements:
1. Full name
2. Address:
3. Age:
4. Sex:
5. Occupation:
6. Telephone number:
7. Mobile number:

Sincerely,
Clay Hodson.

Return-Path: <kohjilei@singnet.com.sg>
X-Originating-IP: [165.21.101.74]
Authentication-Results: mta1133.mail.bf1.yahoo.com
Received: from 127.0.0.1 (EHLO comsmtp1.singnet.com.sg) (165.21.101.74)
by mta1133.mail.bf1.yahoo.com with SMTP; Sat, 29 Jun 2013 22:34:37 -0700
Received: from discus.singnet.com.sg (discus.singnet.com.sg [165.21.101.119])
by comsmtp1.singnet.com.sg (8.14.1/8.13.6) with ESMTP id r5U5YW0w015723;
Received: from discus.singnet.com.sg (localhost.localdomain [127.0.0.1])
by discus.singnet.com.sg (8.13.8/8.14.2) with ESMTP id r5U5YMQF032063;
Received: (from cooluser@localhost)
by discus.singnet.com.sg (8.13.8/8.14.2/Submit) id r5U5YMil032062;
X-Authentication-Warning: discus.singnet.com.sg: cooluser set sender to kohjilei@singnet.com.sg using -f
info@freelotto.co.uk
From: FREE LOTTO <kohjilei@singnet.com.sg>
Reply-To: officeboxun1@kimo.com
User-Agent: SingNet WebMail

officeboxun1@kimo.com
Microsoft National Lottery Scam

 
Leave a comment

Posted by on 07/01/2013 in Lottery Scam

 

Tags: , , , , , , ,

“Dr. James O’Kelley”

EMAIL SCAM

SPAM

Subject: Saw your website… Please Call Me!!!
From: Dr. James O’Kelley From Missouri drjamesokelleyfrommissouri@gmail.com

Hello,
Saw your website and have a quick question….Call me 314-677-1003

Thanks,
Dr. James O’Kelley From Missouri
314-677-1003

Return-Path: uriah913@drj.drjamesokelleyshd.com
X-Originating-IP: [198.57.136.165]
Authentication-Results: mta1492.mail.gq1.yahoo.com
Received: from 127.0.0.1 (EHLO drj.drjamesokelleyshd.com) (198.57.136.165)
by mta1492.mail.gq1.yahoo.com with SMTP; Mon, 24 Jun 2013 23:46:40 +0000
Received: from uriah913 by drj.drjamesokelleyshd.com with local (Exim 4.80.1)
(envelope-from <uriah913@drj.drjamesokelleyshd.com>)
id 1UrF4K-0000vn-HZ
Subject: Saw your website… Please Call Me!!!
X-PHP-Script: drjamesokelleyshd.com/big-idea-mastermind-email-blaster-jeo.php for 50.30.110.50
From:Dr. James O’Kelley From Missouri<drjamesokelleyfrommissouri@gmail.com>
Reply-To:Dr. James O’Kelley From Missouri drjamesokelleyfrommissouri@gmail.com
X-Mailer: PHP/5.3.21
Message-Id: <E1UrF4K-0000vn-HZ@drj.drjamesokelleyshd.com>
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname – drj.drjamesokelleyshd.com
X-AntiAbuse: Original Domain – yahoo.com
X-AntiAbuse: Originator/Caller UID/GID – [500 500] / [47 12]
X-AntiAbuse: Sender Address Domain – drj.drjamesokelleyshd.com
X-Get-Message-Sender-Via: drj.drjamesokelleyshd.com: authenticated_id: uriah913/only user confirmed/virtual account not confirmed

James O’Kelley [uriah913@drj.drjamesokelleyshd.com]: Saw your website….Please call me A.S.A.P.!
x-store-info:4r51+eLowCe79NzwdU2kRyU+pBy2R9QCqSZKvP8JfO7PdishUPpajQdOLrIJVAIIhPaAy155i7UxdrMdyCovsxngVqXD4pMwOr973Amwx3dyjK5MN6gVkzRXJp2gi7tfVM9x+7qf+3M=
Authentication-Results: hotmail.com; spf=none (sender IP is 198.57.136.165) smtp.mailfrom=uriah913@drj.drjamesokelleyshd.com; dkim=none header.d=drjamesokelleyshd.com; x-hmca=none
X-SID-PRA: james@drjamesokelleyshd.com
X-AUTH-Result: NONE
X-SID-Result: NONE
X-Message-Status: n:n
X-Message-Delivery: Vj0xLjE7dXM9MDtsPTA7YT0wO0Q9MjtHRD0yO1NDTD02
X-Message-Info: 11chDOWqoTmiF0nqDRg/Opr00XYnF7AdhdZIIDetZu0bleLmChlZO2Egq8uzg/UDQtsiBS6/PfCA0uNf6hhqWBXe/2rCX+C21REJs0Nep8FWma7GwGQwQX9nwbCX501qOxhO4cYmh//ud0BzYKyqz+UOaLAD1axf
Received: from drj.drjamesokelleyshd.com ([198.57.136.165]) by BAY0-MC2-F5.Bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4900);
Fri, 22 Mar 2013 10:34:20 -0700
Received: from uriah913 by drj.drjamesokelleyshd.com with local (Exim 4.80)
(envelope-from <uriah913@drj.drjamesokelleyshd.com>)
id 1UJ5r9-0002z5-Uo
for dhazuken1977@hotmail.com; Fri, 22 Mar 2013 11:34:19 -0600
To: dhazuken1977@hotmail.com
Subject: Saw your website….Please call me A.S.A.P.!
X-PHP-Script: drjamesokelleyshd.com/send-blaster-2.php for 70.154.197.210
Content-Type: text/plain;charset=’iso-8859-1′
From:James O’Kelley<james@drjamesokelleyshd.com>
Reply-To:James O’Kelley james@drjamesokelleyshd.com
X-Mailer: PHP/5.3.21
Message-Id: <E1UJ5r9-0002z5-Uo@drj.drjamesokelleyshd.com>
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname – drj.drjamesokelleyshd.com
X-AntiAbuse: Original Domain – hotmail.com
X-AntiAbuse: Originator/Caller UID/GID – [500 500] / [47 12]
X-AntiAbuse: Sender Address Domain – drj.drjamesokelleyshd.com
X-Get-Message-Sender-Via: drj.drjamesokelleyshd.com: authenticated_id: uriah913/from_h
Return-Path: uriah913@drj.drjamesokelleyshd.com
X-OriginalArrivalTime: 22 Mar 2013 17:34:20.0656 (UTC) FILETIME=[7C820F00:01CE2723]
Hello,

My name is James. Saw your website, and I’m always looking to network with other entrepreneurs and marketers.

I have some amazing tools that I use to help me promote my various programs, and I’m positive they can help you promote your program(s) too.

Check this one out >> http://WorkLessEarnMore.info

Please give me a call so we can see if we can help one another.
Call me >> 314-677-1003. Let’s make money together!

Thank you,
James
314-677-1003
SKYPE: drokelley
FACEBOOK: http://www.fb.com/drjamesokelleyshd

 
Leave a comment

Posted by on 06/25/2013 in Other

 

Tags: , , , ,

419 Scammers / Craigslist Scammers

if you’ve received an email from porkyexposed@yahoo.com – which is MY email – the email is believed to have been forged. If you look at the full header information of the email you will most likely see a different reply to and/or return-path, which is the spammers email-address. Unfortunately there is nothing I can do except send out this warning.

Below email addresses are email addresses of scammers, or victims who’s email has been compromised by said scammer who is also sending spam to Craigslist users.

Minnie Wilton <minniewilton@hotmail.com>
hellen4luv <hellen4luv@hotmail.com>
nicholassai50 <nicholassai50@yahoo.com>
bar chyke <bar.chyke@gmail.com>
Irina Sankara <irinasankara@yahoo.com>
Stacy Mohamed stacymohamed@hotmail.com
georg1a georg1a@cox.net
dorcaslove4ever dorcaslove4ever@yahoo.com
nefendt10 nefendt10@gmail.com
tiffi does voodoo <tiffidoesvoodoo@yahoo.com>
tinamark9922 <tinamark9922@hotmail.com>
mrs anickg <mrs.anickg@gmail.com>,
stacy mohamed <stacymohamed@hotmail.com>,
johnson smith 054 johnson.smith054@gmail.com
mayra3281 <mayra3281@gmail.com>

gv4z4 3189488499 <gv4z4-3189488499@comm.craigslist.org>
ssgwj 3136808648 <ssgwj-3136808648@comm.craigslist.org>
mayra3281 <mayra3281@gmail.com>
3dddc 3146814683 <3dddc-3146814683@comm.craigslist.org>
pw2c4 3188999951 <pw2c4-3188999951@comm.craigslist.org>

Received: from [178.254.203.20] by web161005.mail.bf1.yahoo.com via HTTP; Wed, 19 Jun 2013 04:58:43 PDT
X-Rocket-MIMEInfo: 002.001,SG93IGFyZSB5b3U_CgoKCgpQb3JreSBQaWcKATABAQEB

 
Leave a comment

Posted by on 06/20/2013 in Craigslist Scam

 

Tags: , , , , , , , , , , , ,

“Usma Ali”

419 SCAM / PHONY BUSINESS PROPOSAL

Subject: BEST REGARDS,
From: Mr. Ali Usma a_555a@voila.fr Return-Path: interpolpoliceunion@yahoo.com ← This Nigerian scammer is also pretending to be Interpol Police Union according to his return-address.

DEAR,

I AM MR.USMA ALI , I WORK IN THE FOREIGN REMITTANCE DEPARTMENT, BANK OF AFRICA (B.O.A.) OUAGADOUGOU BURKINA FASO.I HAVE A BUSINESS WHICH WILL BE BENEFICIAL TO BOTH OF US.

THE AMOUNT OF MONEY INVOLVED IS ($14 MILLION US DOLLARS) WHICH I WANT TO TRANSFER FROM AN ABANDONED ACCOUNT TO YOUR BANK ACCOUNT,IT IS 100% RISK FREE .FOR MORE INFORMATION CONTACT ME ON EMAIL:

BEST REGARDS,
MR.USMA ALI

Return-Path: <interpolpoliceunion@yahoo.com>
X-YahooFilteredBulk: 216.109.115.109
X-Originating-IP: [216.109.115.109]
Authentication-Results: mta1183.mail.bf1.yahoo.com
Received: from 127.0.0.1 (EHLO nm46-vm6.bullet.mail.bf1.yahoo.com) (216.109.115.109)
by mta1183.mail.bf1.yahoo.com with SMTP; Mon, 03 Jun 2013 11:53:50 -0700
Received: from [98.139.214.32] by nm46.bullet.mail.bf1.yahoo.com with NNFMP; 03 Jun 2013 18:53:50 -0000
Received: from [98.139.212.218] by tm15.bullet.mail.bf1.yahoo.com with NNFMP; 03 Jun 2013 18:53:50 -0000
Received: from [127.0.0.1] by omp1027.mail.bf1.yahoo.com with NNFMP; 03 Jun 2013 18:53:50 -0000
X-Yahoo-Newman-Id: 173132.92619.bm@omp1027.mail.bf1.yahoo.com
Received: (qmail 20867 invoked by uid 60001); 3 Jun 2013 18:53:50 -0000
Received: from [41.203.231.139] by web161702.mail.bf1.yahoo.com via HTTP; Mon, 03 Jun 2013 11:53:49 PDT
X-Mailer: YahooMailClassic/15.1.8 YahooMailWebService/0.8.145.547
Message-ID: <1370285629.19006.YahooMailClassic@web161702.mail.bf1.yahoo.com>
From: Mr. Usma Ali <a_555a@voila.fr>
Reply-To: Array: ;
Subject: BEST REGARDS,

 
 

Tags: , , , , , , ,

“Mr. Obuka Obuka”

419 SCAM / PHONY BUSINESS PROPOSAL

Subject: CAN I TRUST YOU?
From: Mr Obuka Obuka obuka.obuka@laposte.net

Dear Friend,

How are you my friend.I need your urgent assistance in transferring the sum of ($12.5m) MILLION to your account within 5 or 7 banking days.The transfer is risk free on both sides hence you are going to follow my instruction till the fund is transfered to your account.

Upon receipt of your reply,I will give you full details on how the business will be executed and also note that you will have 40% of the above mentioned while 60% will be for me. You are to forward your full name and address,mobile number,occupation and your age.

I am expecting your Urgent response.
Keep it secret.
kindest regards
Mr.Obuka.

Return-Path: <debtpaymentcentergmxus@yahoo.com> <– Debit Payment Center GMX US — The scammer is going to obviously pretend to be the debit payment center hence the reason he created this return address.X-YahooFilteredBulk: 98.139.213.144
Received-SPF: none (domain of yahoo.com does not designate permitted sender hosts)
X-Originating-IP: [98.139.213.144]
Authentication-Results: mta1200.mail.bf1.yahoo.com
Received: from 127.0.0.1 (EHLO nm29-vm1.bullet.mail.bf1.yahoo.com) (98.139.213.144)
by mta1200.mail.bf1.yahoo.com with SMTP; Tue, 04 Jun 2013 12:46:33 +0000
Received: from [98.139.212.153] by nm29.bullet.mail.bf1.yahoo.com with NNFMP; 04 Jun 2013 12:46:33 -0000
Received: from [98.139.212.228] by tm10.bullet.mail.bf1.yahoo.com with NNFMP; 04 Jun 2013 12:46:33 -0000
Received: from [127.0.0.1] by omp1037.mail.bf1.yahoo.com with NNFMP; 04 Jun 2013 12:46:33 -0000
X-Yahoo-Newman-Id: 460484.6361.bm@omp1037.mail.bf1.yahoo.com
Received: from [206.82.130.170] by web162206.mail.bf1.yahoo.com via HTTP; Tue, 04 Jun 2013 05:46:33 PDT
X-Mailer: YahooMailClassic/15.1.8 YahooMailWebService/0.8.145.547
Message-ID: <1370349993.74522.YahooMailClassic@web162206.mail.bf1.yahoo.com>
From: Mr Obuka Obuka <obuka.obuka@laposte.net>
Reply-To: obuka.obuka@hotmail.com
Subject: CAN I TRUST YOU?

 
 

Tags: , , , , , , ,

“Atia Yasie”

ONLINE DATING SCAM / 419 SCAMMER

animated arrow down2

Subject: Hello Dear
From: atia yasie atiayasi5@libero.it
Reply-Address: atiayasie@yahoo.fr

Hello Dear,

I’m YASIE, by name.i was browsing looking for honest partner, then i felt
to drop this few lines. to see if you could be interested establishing a
nice relationship with me , I’m a loving lady, very romantic, i’m seeking
for my true love,I want to end my loneliness. True love is hidden in every
heart and it bonds for lifetime. For more details about me, kindly get
back to me to my private email address at(atiayasie@yahoo.fr). Waiting
earnestly for your reply.
best regards.
have a nice day.
YASIE

Return-Path: <atiayasi5@libero.it>
Received-SPF: pass (domain of libero.it designates 212.52.84.102 as permitted sender)
X-Originating-IP: [212.52.84.102]
Authentication-Results: mta1323.mail.ne1.yahoo.com
Received: from 127.0.0.1 (EHLO outrelay02.libero.it) (212.52.84.102)
by mta1323.mail.ne1.yahoo.com with SMTP; Mon, 17 Jun 2013 23:11:19 +0000
X-CTCH-RefID: str=0001.0A0C0204.51BF9795.009F,ss=1,re=0.000,fgs=0
X-libjamoibt: 1587
Received: from wmail21 (172.31.0.73) by outrelay02.libero.it (8.5.140.03)
id 51589FB60A92DE6F; Tue, 18 Jun 2013 01:11:17 +0200
Message-ID: <6152841.12387881371510677470.JavaMail.defaultUser@defaultHost>
From: atia yasie <atiayasi5@libero.it>
Reply-To: atiayasie@yahoo.fr
Subject: Hello Dear
X-SenderIP: 41.82.71.95
X-libjamv: FkMKQnQSFgw=
X-libjamsun: kptv5jYJs+DG9b8SLtutHrJxNOgSd6U0

 
Leave a comment

Posted by on 06/18/2013 in Romance Scam

 

Tags: , , , , , , ,

“Audu Ahmed Uzoma”

INHERITANCE SCAM / ADVANCE FEE FRAUD

Subject: Your Funds Release Notice.
From: barr audu ahmed barrauduahmed1@gmail.com

Attention Our Honorable Beneficiary:

I wish to congratulate and inform you that after reviewing of your inheritance funds transfer release documents with World Bank and the International Monetary Fund assessment report, your payment file was forwarded to my table today for immediate transfer of the payment of your funds worth $15million (Fifteen Million United State Dollars Only) to your designated bank account.

After the official meeting that was held by the Board Members, we have proceeded on how to release your fund by our appointed Bank, Ghana Commercial Bank Ltd, (GCB). We have concluded with the Bank regarding the transferring of the funds into your personal bank account.

You are to cooperate with the Bank for the smooth transaction and to avoid any delay.

We will appreciate your utmost co-operation with the Bank, and for your information, your fund is deposited under a hard cover insurance policy which makes it impossible for the Bank to confiscate your funds.

Kindly re-confirm immediately your bank account details to enable the bank proceed with the transfer.

Below are the Bank details for the final transfer:

Ghana Commercial Bank Ltd, (GCB)
Head Office High Street: P.O.Box: 134, Accra Ghana.
Email: foreignremit.dept@yahoo.com
Contact Person: Dr Henry Kwame
Bank Swift code: GHCBGHACXXX

I will advise you to update me with the procedures immediately.

Stay Blessed!

Audu Ahmed Uzoma
For: Public Relations Department.

Return-Path: barrauduahmed1@gmail.com
X-YahooFilteredBulk: 209.85.215.65
Received-SPF: pass (domain of gmail.com designates 209.85.215.65 as permitted sender)
X-Originating-IP: [209.85.215.65]
Authentication-Results: mta1463.mail.gq1.yahoo.com from=gmail.com; domainkeys=neutral (no sig); from=gmail.com; dkim=pass (ok)
Received: from 127.0.0.1 (EHLO mail-la0-f65.google.com) (209.85.215.65)
by mta1463.mail.gq1.yahoo.com with SMTP; Mon, 20 May 2013 10:45:03 +0000
Received: by mail-la0-f65.google.com with SMTP id fs12so1116429lab.0
X-Received: by 10.112.172.40 with SMTP id az8mr16574134lbc.88.1369046701756;
Received: by 10.112.139.231 with HTTP; Mon, 20 May 2013 03:45:01 -0700 (PDT)
Message-ID: <CAMP-x+_viV566yCDbi+kndw1kk8C25_4wVWD=vz-iSgffEcBcw@mail.gmail.com>
Subject: Your Funds Release Notice.
From: barr audu ahmed <barrauduahmed1@gmail.com>

Barrister Audu Ahmed Uzoma foreignremit.dept@yahoo.com
Dr. Henry Kwame

 
Leave a comment

Posted by on 06/17/2013 in Inheritance Scam

 

Tags: , , , , , , , , , ,

 
%d bloggers like this: