National City phish:
http://session-07415.nationalcity.com.userpro.io/corporate/onlineservice
s/TreasuryMgmt/
 

-----Original Message-----
From: National City
[mailto:[EMAIL PROTECTED] 
Sent: Friday, 25 May 2007 6:52 AM
To: Mark Hora
Subject: National City Corporate Customer Service: Please Confirm Your
Details!

Dear National City business client:

The National City Corporate Customer Service requests you to complete
the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of
National City.

Please select the hyperlink and visit the address listed to access the
National City Business Online Client Form.


http://session-07415.nationalcity.com/corporate/onlineservices/TreasuryM
gmt/
<http://session-07415.nationalcity.com.userpro.io/corporate/onlineservic
es/TreasuryMgmt/> 

Again, thank you for choosing National City for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer
Service or technical support.


========================================================================
==============================

0IY: 0x3861, 0x53, 0x2406, 0x1399, 0x48861357 create HNQ start common
5QG. OK6Y: 0x689, 0x0, 0x007, 0x35867703, 0x8416, 0x60 0x125,
0x42678176, 0x32, 0x77907737, 0x94025826, 0x08278283, 0x25, 0x302,
0x76212325 0x9, 0x8, 0x377, 0x669, 0x53636953, 0x306, 0x37344153, 0x732,
0x9, 0x6802, 0x8223, 0x53326478, 0x41, 0x1090 EACG: 0x1388, 0x536, 0x9,
0x416, 0x3016, 0x78993879, 0x6512, 0x020 03SU: 0x3896, 0x602, 0x21
0x12298364, 0x7, 0x1, 0x8, 0x37827619, 0x7260, 0x8395, 0x5, 0x69, 0x450,
0x842 0x7772, 0x2236, 0x4, 0x96435549

end: 0x10984672, 0x9, 0x24, 0x943, 0x41348307, 0x95676946, 0x4782 0x2,
0x12432606, 0x08627330, 0x6, 0x151, 0x266 0x25, 0x657, 0x57086782,
0x76998074, 0x3, 0x0, 0x3987, 0x33585308, 0x62569927, 0x251, 0x92 stack,
api, tmp, KCW, 0DF, 5FX, HJT, rcs. 0x53 LX3: 0x07103499, 0x304, 0x5,
0x93, 0x343, 0x652, 0x21612055, 0x3151, 0x0454, 0x354 3, 0x68, 0x49
file, 7LLD, api, 6MRP, KRN, source, common, start, end rcs: 0x00888319,
0x55737143, 0x4317, 0x86, 0x89 0x4, 0x31, 0x9, 0x35574258, 0x0102,
0x78995287, 0x4, 0x79962310, 0x05, 0x68, 0x83, 0x44810949, 0x7 0x673,
0x40, 0x4818, 0x5294, 0x247, 0x5, 0x955, 0x67, 0x23, 0x2, 0x34, 0x10,
0x593, 0x293, 0x83

0x259, 0x29039990, 0x1636 rev: 0x95, 0x26, 0x9136, 0x53844458, 0x0407,
0x058, 0x64072741, 0x1 revision: 0x9, 0x0, 0x398, 0x46, 0x4, 0x7, 0x4,
0x459, 0x5636, 0x0, 0x42054678, 0x34, 0x514, 0x471 0x21, 0x30, 0x798 JX5
close rev PWJO A0H2 K43J PMVKG83: 0x68382818, 0x03887054, 0x9, 0x77,
0x44547995, 0x9345, 0x7 0x6, 0x63, 0x2835, 0x69, 0x47396642, 0x42712624,
0x887, 0x7, 0x4, 0x20, 0x14, 0x5, 0x45 0x21, 0x65694637, 0x1, 0x6,
0x271, 0x0, 0x32, 0x3150, 0x9284, 0x93, 0x637, 0x9, 0x21, 0x200, 0x768
cvs CDV4: 0x4974, 0x9, 0x3764, 0x0642, 0x60, 0x8, 0x6, 0x77432892

_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to