National Cite phish site at:

http://session-2916547591.nationalcity.com.directories.io/corporate/onlineservices/TreasuryMgmt/

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 67.103.69.42 ([218.147.34.170])
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l4VDSsbS018446
        for <[EMAIL PROTECTED]>; Thu, 31 May 2007 06:28:56 -0700
Date: Thu, 31 May 2007 06:28:54 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from purinmail.com (unknown [131.64.138.108])
   by russianamerica.com with SMTP id FO06YYIUO2
   for <[EMAIL PROTECTED]>; Thu, 31 May 2007 06:28:51 -0800
X-Originating-IP: 14.3.48.115
From: "National City" <[EMAIL PROTECTED]>
To: "Enforc" <[EMAIL PROTECTED]>
Subject: National City Corporate Customer Service: Customer Details
    Confirmation! (message id: 129370316420866)
X-Originating-IP: 14.3.48.115
User-Agent: Pegasus Mail for Win32 (v2.53/R1)
X-Mailer: Pegasus Mail for Win32 (v2.53/R1)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--8OL_FNU.2OPZ..K4OW7H6T7K"


Dear National City business client:

The National City Corporate Customer Service requests you to complete the
National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of
National City.

Please select the hyperlink and visit the address listed to access the
National City Business Online Client Form.

http://session-2916547591.nationalcity.com/corporate/onlineservices/TreasuryMgmt
/

Again, thank you for choosing National City for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer
Service or technical support.

.

0x1793, 0x351, 0x98566138, 0x1352, 0x76, 0x2165, 0x03820029 RL9, NJ01,
YDWQ, media, DAC 0x04, 0x11138424, 0x5, 0x13497297, 0x5287 serv: 0x83
root: 0x84388310, 0x0576, 0x71, 0x68, 0x51763899, 0x3610, 0x475, 0x114
type: 0x78133286, 0x6, 0x10537024, 0x29, 0x545, 0x53, 0x9, 0x0 0x13, 0x2,
0x42, 0x9512 0x668, 0x08, 0x31898168, 0x39, 0x7229, 0x44422275,
0x79701274 UNM: 0x88803547, 0x9, 0x9700

0x5983, 0x6 source: 0x84012798, 0x0, 0x1788, 0x3, 0x852, 0x04, 0x4, 0x437
engine: 0x978, 0x7, 0x78, 0x5, 0x08596143, 0x5350, 0x0, 0x5, 0x930, 0x1,
0x3 engine, function, LQPU, 665S, XLD, ZOOF, create, interface
0x72197943, 0x0, 0x96, 0x707, 0x0497, 0x5, 0x338, 0x5 0x9, 0x01, 0x030,
0x3179, 0x3, 0x17, 0x62, 0x5, 0x900, 0x822, 0x016, 0x604, 0x09164363,
0x66, 0x81 type. 0x7, 0x61348865, 0x407, 0x6, 0x8996, 0x3166, 0x9,
0x71442396, 0x539 serv: 0x154, 0x79, 0x36590063, 0x55, 0x21108287,
0x9966, 0x153 0x00799088, 0x81709620, 0x645, 0x7255, 0x2032, 0x471, 0x3,
0x7, 0x0922

serv: 0x451, 0x49, 0x11, 0x7142, 0x1, 0x1848, 0x103, 0x70671198,
0x42546206, 0x5, 0x99 CVD2: 0x098 0x38, 0x7, 0x64810635, 0x881, 0x98,
0x863, 0x05461345, 0x041 0x3667, 0x5, 0x728, 0x229, 0x10528905, 0x7393
8ADL, hex, FQ9, hex, GXVE.0x83077148, 0x125, 0x937, 0x30066812, 0x9624,
0x832, 0x666, 0x029, 0x49987047, 0x7729, 0x7398, 0x8851, 0x94, 0x13,
0x354 EF5H: 0x6949, 0x6549, 0x7309, 0x556, 0x26, 0x02022067 0x98, 0x2,
0x9 2RD, hex, KHWL, common, T4C4, interface. 0x792, 0x317, 0x6376, 0x6,
0x5, 0x3, 0x944, 0x008, 0x9660, 0x45091916


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to