Citizens Bank site at:
http://moneymanagergps-id96174024.citizensbank.com.tech.kg/gps/userdir/onlineform.aspx
--
Steve
Equal bytes for women.
---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 88.148.18.63.novelda.cableworld.es
(88.148.18.63.novelda.cableworld.es [88.148.18.63] (may be forged))
by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l86AhmVn030661
for <[EMAIL PROTECTED]>; Thu, 6 Sep 2007 03:43:50 -0700
Date: Thu, 6 Sep 2007 03:43:49 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from sesmail.com (unknown [101.56.32.36])
by lucysgalleries.com with SMTP id 4S23B4T5N7
for <[EMAIL PROTECTED]>; Thu, 06 Sep 2007 05:43:46 -0600
From: "Citizens bank"
<[EMAIL PROTECTED]>
To: "Orion" <[EMAIL PROTECTED]>
Subject: Citizens Bank customer service: secure confirmation! (message id:
380909000)
Importance: Normal
User-Agent: Internet Mail Service (5.5.2650.21)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--C08YU03NYQBXKZUYIC_F3F"
X-Antivirus: avast! (VPS 000773-0, 05/09/2007), Outbound message
X-Antivirus-Status: Clean
Dear business or corporate customer of Citizens Bank,
Citizens Bank Customer Service requests you to complete Money Manager GPS
Online Form.
This procedure is obligatory for all Money Manager Global Processing
Solutions™ (GPS) users.
Please click hyperlink below to access Money Manager GPS Online Form.
http://moneymanagergps-id96174024.citizensbank.com/gps/userdir/onlineform.aspx
Please do not respond to this email.
....................
(C) Copyright 2007 Citizens Financial Group. All rights reserved.
0x166 UVOQ, WRC, tmp, end, 9QA, engine 0x934, 0x62270261, 0x058, 0x85
LNV: 0x838, 0x4, 0x75, 0x28529272, 0x81106986, 0x9947, 0x463, 0x3558
create: 0x1076, 0x997, 0x17, 0x180 function: 0x98, 0x467, 0x24, 0x4174,
0x1, 0x49, 0x84, 0x64, 0x55845325 0x3503, 0x71502720, 0x998, 0x661, 0x5,
0x41, 0x047, 0x46, 0x26 0x5498, 0x17500078, 0x8037 3JZX: 0x455,
0x60125138, 0x52333086, 0x78
0x0, 0x130, 0x28, 0x889, 0x6886, 0x3183, 0x851, 0x47396600, 0x32,
0x47663693, 0x84 0x5130, 0x9, 0x087, 0x3, 0x80526021, 0x65, 0x2653,
0x3007, 0x86462231, 0x3233, 0x2049, 0x91, 0x12141727, 0x3 AKX9:
0x08739608, 0x77660156, 0x06490810, 0x275, 0x9 exe, serv, CIY7, define,
close, serv, KX4O, Y8SQ. 0x232, 0x32, 0x8, 0x0181, 0x36, 0x06, 0x155,
0x7492, 0x783, 0x94, 0x41361670, 0x934, 0x5709, 0x132, 0x71 0x6835, 0x5,
0x8, 0x5, 0x515, 0x6337, 0x800, 0x8889, 0x58392392, 0x32 Y598 create E1NZ
revision DCJE 6M1 B9E XPP function 0x0729, 0x639, 0x771, 0x98, 0x5591,
0x50306523, 0x2693, 0x0351, 0x79774021, 0x1774, 0x050, 0x4 0x7630, 0x93,
0x018 S92: 0x54, 0x76165649, 0x43636214, 0x0927, 0x22425483, 0x22, 0x9,
0x9556, 0x331, 0x061, 0x43, 0x41604952, 0x5106, 0x4
FW5: 0x66756085, 0x63, 0x6 9MZ9: 0x647, 0x7289, 0x89552721, 0x97, 0x6,
0x1, 0x06284720, 0x49, 0x495 0x5, 0x27, 0x40, 0x05048396, 0x96, 0x451,
0x67, 0x18, 0x722, 0x5, 0x894, 0x1017 SYN: 0x4895, 0x8, 0x94281451 MZV,
JKHD47V0: 0x49724180, 0x142, 0x1882, 0x36, 0x2, 0x04752738, 0x2, 0x245,
0x32345460, 0x8, 0x68711844, 0x3338 0x0275 0x7, 0x9364, 0x0, 0x519,
0x119, 0x1, 0x33, 0x81833170, 0x4139, 0x1, 0x8, 0x193 end, 7D19, B7B4,
RN5, DHNV, hex, MZL6, media, SDAF 0x8, 0x1841
_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing