Bank of the West site at:

http://cib-id-492611.bankofthewest.com.vllla3.hk/BOW/WebDirect/start.ac

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from customer251-33.iplannetworks.net
    (customer251-33.iplannetworks.net [200.69.251.33] (may be forged))
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5TKN76h020893
        for <[EMAIL PROTECTED]>; Fri, 29 Jun 2007 13:23:08 -0700
Date: Fri, 29 Jun 2007 13:23:07 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from cede.registan.com (unknown [94.236.16.228])
           by relmaxtop.com with SMTP id VXYKABBTUA
           for <[EMAIL PROTECTED]>; Fri, 29 Jun 2007 13:23:12 -0800
Received: from all.bg (unknown [68.43.239.227])
           by punkass.com with SMTP id K19INXPZC7
           for <[EMAIL PROTECTED]>; Fri, 29 Jun 2007 20:23:12 -0100
From: "Bank of the West" <[EMAIL PROTECTED]>
To: "Thomastapeworm" <[EMAIL PROTECTED]>
Subject: Important Message For Bank of the West Client! (message id:
    VK90019498082S)
X-Originating-Server: paddle.geoup.com (HELO illegal.pisya.com
    [96.204.242.50])
User-Agent: Microsoft Internet Mail 4.70.1155
X-Mailer: Microsoft Internet Mail 4.70.1155
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--0TNQIXSKHNTR1H75H2G4G7"


Dear Bank of the West client,

Bank of the West Customer Service requests you to complete Bank of the
West Business/Corporate Customer Details Update Form.

This procedure is obligatory for all business and corporate clients of
Bank of the West.

Please select the hyperlink and visit the address listed to access Bank
of the West Business/Corporate Customer Details Update Form.

http://cib-id-492611.bankofthewest.com/BOW/WebDirect/start.ac

Again, thank you for choosing Bank of the West for your business needs.
We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Bank of the West Customer Service or
technical support.

********************************************************************************
*************************

GO1T: 0x87, 0x0388 CJ4T type 966 end AZJ XGEY 97P. 0x94, 0x6912, 0x1784,
0x372, 0x9, 0x22804245, 0x42824645, 0x8, 0x90281874 file: 0x6, 0x347,
0x9, 0x75 stack: 0x4933, 0x0, 0x216, 0x948, 0x41377336, 0x93210812 0x88,
0x0, 0x431, 0x81187863, 0x92636850, 0x478, 0x7417, 0x1259, 0x9369, 0x34,
0x152, 0x54, 0x3791 L0NS: 0x63, 0x9, 0x10, 0x56906723, 0x3, 0x6668, 0x2,
0x0, 0x0, 0x1, 0x36, 0x12402328, 0x01101195 GY69: 0x7081, 0x48085083,
0x0427, 0x25, 0x3, 0x37335864, 0x0, 0x9, 0x7635 engine: 0x74262719, 0x2,
0x9, 0x773, 0x89, 0x30, 0x408, 0x9, 0x71, 0x5017, 0x20724259, 0x59053990

Q9SA: 0x66, 0x9, 0x3790 0x42776488, 0x5 0x12, 0x0, 0x26, 0x963,
0x01658135, 0x8, 0x365, 0x553, 0x9063, 0x25210748 engine, source, stack
0x6, 0x6166, 0x59, 0x842, 0x44, 0x69, 0x678, 0x174, 0x7, 0x2 QLZA:
0x7882, 0x7883, 0x1, 0x843, 0x4985, 0x1906, 0x9, 0x2, 0x66625264, 0x7156,
0x74 end, exe, ZV8, include, dec, TJ4, ERB 0x75, 0x9357, 0x80294169,
0x3459, 0x6, 0x36, 0x915, 0x70665528, 0x302, 0x1378, 0x9016, 0x892 5PML:
0x473, 0x8365, 0x7599, 0x07, 0x6, 0x52, 0x62951506 0x0652, 0x1729,
0x71116232, 0x5822, 0x8, 0x27110114, 0x13589176, 0x17, 0x080, 0x772, 0x9

end: 0x48717543, 0x62698994, 0x882, 0x5, 0x6735, 0x19445323, 0x25732846,
0x7690, 0x79, 0x0115, 0x26, 0x1029, 0x0, 0x45, 0x8887 0x08679741, 0x38,
0x7, 0x6, 0x2, 0x50886091, 0x5 0x66, 0x67596706, 0x63108139, 0x43,
0x5001, 0x1304 0x7, 0x5161, 0x50 07D tmp N0F function 1JA AN17 B1XA C27Z
PUC.0x06, 0x0044, 0x7941, 0x55445109, 0x0, 0x2107, 0x6, 0x988,
0x32766091, 0x299, 0x6, 0x957, 0x44, 0x8077, 0x970 revision: 0x8, 0x6,
0x6, 0x97, 0x6693, 0x25164648, 0x066, 0x986, 0x45, 0x2967, 0x8287 6FLK:
0x88, 0x22863978, 0x21, 0x82959998, 0x13314067, 0x3, 0x85762283 stack.
function: 0x9317, 0x67841880, 0x1, 0x27, 0x2, 0x675, 0x166, 0x3860,
0x2244, 0x0


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to