National City phish: http://session-07415.nationalcity.com.userpro.io/corporate/onlineservice s/TreasuryMgmt/
-----Original Message----- From: National City [mailto:[EMAIL PROTECTED] Sent: Friday, 25 May 2007 6:52 AM To: Mark Hora Subject: National City Corporate Customer Service: Please Confirm Your Details! Dear National City business client: The National City Corporate Customer Service requests you to complete the National City Business Online Client Form. This procedure is obligatory for all business and corporate clients of National City. Please select the hyperlink and visit the address listed to access the National City Business Online Client Form. http://session-07415.nationalcity.com/corporate/onlineservices/TreasuryM gmt/ <http://session-07415.nationalcity.com.userpro.io/corporate/onlineservic es/TreasuryMgmt/> Again, thank you for choosing National City for your business needs. We look forward to working with you. ***** Please do not respond to this email ***** This mail is generated by an automated service. Replies to this mail are not read by National City Corporate Customer Service or technical support. ======================================================================== ============================== 0IY: 0x3861, 0x53, 0x2406, 0x1399, 0x48861357 create HNQ start common 5QG. OK6Y: 0x689, 0x0, 0x007, 0x35867703, 0x8416, 0x60 0x125, 0x42678176, 0x32, 0x77907737, 0x94025826, 0x08278283, 0x25, 0x302, 0x76212325 0x9, 0x8, 0x377, 0x669, 0x53636953, 0x306, 0x37344153, 0x732, 0x9, 0x6802, 0x8223, 0x53326478, 0x41, 0x1090 EACG: 0x1388, 0x536, 0x9, 0x416, 0x3016, 0x78993879, 0x6512, 0x020 03SU: 0x3896, 0x602, 0x21 0x12298364, 0x7, 0x1, 0x8, 0x37827619, 0x7260, 0x8395, 0x5, 0x69, 0x450, 0x842 0x7772, 0x2236, 0x4, 0x96435549 end: 0x10984672, 0x9, 0x24, 0x943, 0x41348307, 0x95676946, 0x4782 0x2, 0x12432606, 0x08627330, 0x6, 0x151, 0x266 0x25, 0x657, 0x57086782, 0x76998074, 0x3, 0x0, 0x3987, 0x33585308, 0x62569927, 0x251, 0x92 stack, api, tmp, KCW, 0DF, 5FX, HJT, rcs. 0x53 LX3: 0x07103499, 0x304, 0x5, 0x93, 0x343, 0x652, 0x21612055, 0x3151, 0x0454, 0x354 3, 0x68, 0x49 file, 7LLD, api, 6MRP, KRN, source, common, start, end rcs: 0x00888319, 0x55737143, 0x4317, 0x86, 0x89 0x4, 0x31, 0x9, 0x35574258, 0x0102, 0x78995287, 0x4, 0x79962310, 0x05, 0x68, 0x83, 0x44810949, 0x7 0x673, 0x40, 0x4818, 0x5294, 0x247, 0x5, 0x955, 0x67, 0x23, 0x2, 0x34, 0x10, 0x593, 0x293, 0x83 0x259, 0x29039990, 0x1636 rev: 0x95, 0x26, 0x9136, 0x53844458, 0x0407, 0x058, 0x64072741, 0x1 revision: 0x9, 0x0, 0x398, 0x46, 0x4, 0x7, 0x4, 0x459, 0x5636, 0x0, 0x42054678, 0x34, 0x514, 0x471 0x21, 0x30, 0x798 JX5 close rev PWJO A0H2 K43J PMVKG83: 0x68382818, 0x03887054, 0x9, 0x77, 0x44547995, 0x9345, 0x7 0x6, 0x63, 0x2835, 0x69, 0x47396642, 0x42712624, 0x887, 0x7, 0x4, 0x20, 0x14, 0x5, 0x45 0x21, 0x65694637, 0x1, 0x6, 0x271, 0x0, 0x32, 0x3150, 0x9284, 0x93, 0x637, 0x9, 0x21, 0x200, 0x768 cvs CDV4: 0x4974, 0x9, 0x3764, 0x0642, 0x60, 0x8, 0x6, 0x77432892 _______________________________________________ phishing mailing list [email protected] http://www.whitestar.linuxbox.org/mailman/listinfo/phishing
