http://session-733221696.nationalcity.com.userpro.io/corporate/onlineser
vices/TreasuryMgmt/

________________________________

From: National City
[mailto:[EMAIL PROTECTED] 
Sent: Tuesday, 29 May 2007 8:21 AM
To: Mark Hora
Subject: *****SPAM***** secure confirmation! (mess_id: L6945187HH)



Dear National City business client:

The National City Corporate Customer Service requests you to complete
the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of
National City.

Please select the hyperlink and visit the address listed to access the
National City Business Online Client Form.


http://session-733221696.nationalcity.com/corporate/onlineservices/Treas
uryMgmt/
<http://session-733221696.nationalcity.com.userpro.io/corporate/onlinese
rvices/TreasuryMgmt/> 

Again, thank you for choosing National City for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer
Service or technical support.


.

0x23149237, 0x78, 0x7347, 0x0, 0x13, 0x5, 0x2, 0x59753607, 0x0,
0x98075404, 0x886 start, ZAB, S616, GOEZ, UJAA, Q3L. R8I: 0x972, 0x764,
0x76884877, 0x22132863, 0x912, 0x6718, 0x34, 0x55239767, 0x407,
0x92033040, 0x9176 0x94085864, 0x672, 0x3705, 0x76, 0x67081806, 0x7,
0x4838, 0x51, 0x96970005, 0x3, 0x078, 0x798 PGE3: 0x0, 0x31, 0x12,
0x499, 0x3, 0x4, 0x0226, 0x6327, 0x8, 0x832, 0x96, 0x60615500, 0x228
Y4J: 0x5420, 0x5 DDY: 0x05479611, 0x767, 0x74559989, 0x5, 0x5876, 0x899,
0x50, 0x3, 0x8499, 0x33, 0x6488 0x3172 KUB4: 0x00033446, 0x3, 0x210,
0x8144, 0x8, 0x77277474, 0x61519055, 0x1, 0x73

0x0039, 0x61, 0x6, 0x2574, 0x60127458, 0x979 0x62, 0x342, 0x00116492,
0x54549045, 0x23, 0x4, 0x1, 0x1271, 0x356 84EE: 0x552, 0x19660150,
0x9878, 0x6396, 0x826, 0x7, 0x361, 0x73548451, 0x79, 0x6323, 0x5,
0x13317116, 0x27, 0x71, 0x2 N2Z, 0BZ8, GMM LBW: 0x5120074 2 close: 0x64,
0x187, 0x2095, 0x4615, 0x4, 0x39, 0x8, 0x24938400, 0x0473, 0x65494913,
0x08, 0x738 10Z QMN XV5 K9LS function type type UIT interface. EQW: 0x8,
0x9, 0x84, 0x8831 serv: 0x14614732, 0x08, 0x20960011 0x8196, 0x9427,
0x77931553, 0x1, 0x8691, 0x1, 0x9374, 0x136, 0x86624310, 0x1, 0x925,
0x36537273

K0S: 0x678, 0x7528, 0x786, 0x7, 0x77362854, 0x69170014, 0x83,
0x18774071, 0x85, 0x9, 0x5708, 0x45, 0x82, 0x11 0x8263, 0x00333129 JEH:
0x9959, 0x0272, 0x628 interface: 0x8314, 0x75557915, 0x0, 0x34736395 hex
6YH WS1 OR8 69CJ PIW engine.0x1 tmp: 0x47766376, 0x6922, 0x72, 0x270,
0x52138475, 0x4, 0x1 FKNC: 0x920, 0x335, 0x08, 0x98, 0x36, 0x11
interface IEEB serv UUHQ: 0x03627785, 0x9209, 0x4, 0x2, 0x6218, 0x3502,
0x2, 0x07947265, 0x52771165, 0x0, 0x8501, 0x8182, 0x6914

_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to