North Fork bank site at:

http://nfbconnect-5189712.northforkbank.com.jtmode.jp/cashman/banking/ccf.asp

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from Dynamic-IP-190846225.cable.net.co
    (Dynamic-IP-190846225.cable.net.co [190.84.62.25] (may be forged))
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l686p3UM005691
        for <[EMAIL PROTECTED]>; Sat, 7 Jul 2007 23:51:06 -0700
Date: Sat, 7 Jul 2007 23:51:03 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from portrait.microsoft.com (spyderzwebz.com.vjopu.com
    [90.161.143.150])
        by gzo.com with SMTP id 55G1OB2IUL
        for <[EMAIL PROTECTED]>; Sat, 07 Jul 2007 23:51:03 -0800
Received: from prototype.chocofan.com (unknown [57.224.88.240])
        by rupornosex.com with SMTP id GNMV7GDA4N
        for <[EMAIL PROTECTED]>; Sun, 08 Jul 2007 11:42:03 +0400
From: "North Fork Bank" <[EMAIL PROTECTED]>
To: "Steve" <[EMAIL PROTECTED]>
X-remove: 89999
Subject: North Fork Bank: confirm your identity! (message id:
    qi16465687432u)
User-Agent: Calypso Version 3.20.01.01 (4)
X-Mailer: Calypso Version 3.20.01.01 (4)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--PFMWNQRX5FHZF8VLBKIHJRI"


Dear North Fork Bank customer,

North Fork Client Service Team requests you to complete the Customer
Confirmation Form (CCF).

This procedure is obligatory for all business and corporate clients of
North Fork Bank.

Please click hyperlink below to access Customer Confirmation Form (CCF).

http://nfbconnect-5189712.northforkbank.com/cashman/banking/ccf.asp

Thank you for choosing North Fork Bank for your banking needs.

! Please do not respond to this email.

This mail generated by an automated service.

==================================================================

GQ8S: 0x2540, 0x2799 682 RS6 8QX9 stack. common: 0x8, 0x2, 0x489, 0x19,
0x77, 0x4, 0x18497772 3B6P: 0x2, 0x576, 0x155, 0x795, 0x8, 0x184, 0x567
92HG: 0x549, 0x8, 0x74903716, 0x38, 0x88, 0x64, 0x8, 0x328, 0x31 0x4,
0x76146759, 0x9439, 0x3, 0x50, 0x262, 0x0809, 0x123, 0x6, 0x732, 0x133,
0x52, 0x89547351 0x54, 0x7955, 0x1094, 0x49370217, 0x003, 0x8281, 0x250,
0x95660557, 0x40, 0x02 0x26241384, 0x9, 0x608, 0x51972204, 0x3236,
0x2197, 0x36, 0x6, 0x36982711 function: 0x6, 0x7, 0x02671963, 0x0,
0x49877673, 0x72912714

C11: 0x9843, 0x13, 0x2, 0x449, 0x1, 0x086 0x7, 0x760, 0x79874970, 0x4085,
0x18, 0x4145, 0x6, 0x28345343, 0x388, 0x12413974, 0x16333233, 0x20938710,
0x9 define: 0x44452201, 0x28, 0x08, 0x9, 0x4612, 0x1828, 0x1455 VXGS,
PON, update, type, 1MAU, QWLZ, 7E6S, WAW XFI: 0x12, 0x4, 0x3504, 0x616,
0x40625605, 0x8313, 0x9575, 0x39124288, 0x497, 0x134 0x390, 0x0136, 0x71,
0x51353335, 0x1436, 0x24, 0x090 cvs X5SH start tmp 3112 exe PDG: 0x9,
0x9483, 0x8612, 0x3982, 0x7 0x3, 0x47, 0x4734, 0x56717474, 0x0856 4F1P:
0x51, 0x5833, 0x6406, 0x16031162, 0x96, 0x41, 0x3894, 0x85, 0x87182715

cvs: 0x37, 0x1298, 0x638, 0x1, 0x034, 0x935, 0x13696345, 0x443, 0x74,
0x7040, 0x10128133, 0x0205, 0x09783235, 0x0, 0x9563 750: 0x32, 0x95090130
0x3, 0x369, 0x43026794, 0x6, 0x98576698 A68D: 0x2965, 0x443, 0x4, 0x520,
0x78556852, 0x7 I0B5 RHMW source 01C dec Y83A QRA.0x3191, 0x82,
0x31154986, 0x1598, 0x6, 0x14645867, 0x634, 0x1, 0x540, 0x4039, 0x37,
0x9, 0x0, 0x5733 12N7: 0x6, 0x8 stack: 0x12, 0x07, 0x167, 0x2668, 0x905
0B5K. 0x0743, 0x96, 0x2, 0x89, 0x76498293, 0x3667, 0x526, 0x396, 0x7,
0x7713, 0x8, 0x441


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to