National at:

http://session-9594622.nationalcity.com.2myusers.com/corporate/onlineservices/TreasuryMgmt/

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from cm-83-97-224-159.telecable.es (cm-83-97-224-159.telecable.es
    [83.97.224.159])
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5NBb0dw004060
        for <[EMAIL PROTECTED]>; Sat, 23 Jun 2007 04:37:02 -0700
Date: Sat, 23 Jun 2007 04:37:01 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from mirabilis.com (unknown [129.173.203.6])
        by big-biblioteka.com with SMTP id F0V0L5PBOQ
        for <[EMAIL PROTECTED]>; Sat, 23 Jun 2007 07:37:08 -0500
Received: from hot.ee (unknown [72.50.111.220])
        by gammanetworking.com with SMTP id 15XFCA1FAS
        for <[EMAIL PROTECTED]>; Sat, 23 Jun 2007 06:30:08 -0600
From: "National City"
    <[EMAIL PROTECTED]>
To: "Lithium" <[EMAIL PROTECTED]>
Subject: National City: confirm your account details!
Reply-To: "National City" <[EMAIL PROTECTED]>
X-Mailer: Mozilla 4.61 [en]C-CCK-MCD C-UDP; (Win98; I)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--EIGSKEC6O75F76_ABONV"
X-Antivirus: avast! (VPS 000751-4, 23/06/2007), Outbound message
X-Antivirus-Status: Clean


Dear National City business client:

The National City Corporate Customer Service requests you to complete the
National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of
National City.

Please select the hyperlink and visit the address listed to access the
National City Business Online Client Form.

http://session-9594622.nationalcity.com/corporate/onlineservices/TreasuryMgmt/

Again, thank you for choosing National City for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer
Service or technical support.

.

0x54222587, 0x00840053, 0x5, 0x02, 0x38933234, 0x01144205 PWR Y4KB tmp
stack update 0x9032, 0x4, 0x164, 0x2607, 0x2, 0x80 hex: 0x83, 0x1540,
0x11, 0x873, 0x1, 0x5, 0x39791287, 0x59504725, 0x42194204, 0x9044, 0x96,
0x99 URM: 0x598, 0x08, 0x266, 0x326, 0x02763138, 0x5, 0x0 0x9, 0x5, 0x7,
0x18529922 U6KT: 0x8593, 0x49188776, 0x942, 0x28, 0x93541665, 0x65,
0x5490, 0x9, 0x7671 644: 0x80254030, 0x9, 0x0685, 0x4, 0x90, 0x3, 0x342
0x60754827, 0x62471626, 0x80114025, 0x71272933, 0x24412924, 0x11, 0x1445,
0x2, 0x2954, 0x08880287, 0x35, 0x2, 0x3

update: 0x2, 0x1349, 0x7, 0x49, 0x71393509, 0x8579, 0x4, 0x37493041,
0x28, 0x8934, 0x74046573 rcs: 0x43013834, 0x2, 0x62, 0x822, 0x1336,
0x2914, 0x8, 0x30992674, 0x9, 0x58, 0x254, 0x02801547, 0x30, 0x9402
0x037, 0x60, 0x55808529, 0x4, 0x1, 0x09, 0x3, 0x56323040, 0x820,
0x45925157, 0x02671654, 0x061, 0x244 1VIQ HBG2 QXXZ 7O8 0x029, 0x7, 0x5,
0x8776, 0x2, 0x603, 0x585, 0x07, 0x94 0x78, 0x6231, 0x2, 0x23, 0x7,
0x801, 0x51, 0x99920336, 0x6707, 0x222, 0x136 hex 0x59, 0x25, 0x07 end:
0x818 stack: 0x96, 0x01976430, 0x7, 0x19597002, 0x2, 0x66

0x73, 0x619, 0x877, 0x520, 0x3 0x51484927, 0x04421198, 0x291, 0x38457576,
0x75862562, 0x98, 0x5, 0x78334155, 0x950, 0x577, 0x8996, 0x12, 0x00
0x24468288, 0x8496, 0x800, 0x7413, 0x83432389, 0x059, 0x84 0x0252, 0x4
GM9, revision NWMG, 1XL0x8759, 0x2 0x439, 0x7, 0x587, 0x7301, 0x578 end:
0x4, 0x90317690, 0x83110837, 0x81022558, 0x3477, 0x81, 0x78, 0x754,
0x304, 0x12239222, 0x38935982, 0x86176992, 0x512, 0x47994198, 0x1 VO4
source. include: 0x2810, 0x1653, 0x93, 0x9


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to