National City phishing site at:

http://session-053232.nationalcity.com.uiore.hk/corporate/onlineservices/TreasuryMgmt/

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from sm-217-129-208-127.netvisao.pt
    (sm-217-129-208-127.netvisao.pt [217.129.208.127] (may be forged))
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5ONbU3Y010750
        for <[EMAIL PROTECTED]>; Sun, 24 Jun 2007 16:37:32 -0700
Date: Sun, 24 Jun 2007 16:37:30 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from pgawtn.com (novgorod.com.content-guys.com [92.30.32.36])
        by stormpay.com with SMTP id BYRHEK7AC6
        for <[EMAIL PROTECTED]>; Sun, 24 Jun 2007 16:37:33 -0800
Received: from pacbell.net (helo pacbell.net.findwhat.com [57.98.106.103])
        by kasserver.com with SMTP id XSXGB5S0HJ
        for <[EMAIL PROTECTED]>; Mon, 25 Jun 2007 04:37:33 +0400
Sender: "National City" <[EMAIL PROTECTED]>
From: "National City" <[EMAIL PROTECTED]>
To: "Orion" <[EMAIL PROTECTED]>
Subject: National City Corporate Customer Service: Important Security
    Update!
Sender: "National City" <[EMAIL PROTECTED]>
User-Agent: Microsoft Internet Mail 4.70.1155
X-Mailer: Microsoft Internet Mail 4.70.1155
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--9SK4RQD.F5MF7L1MEOT"


Dear National City business client:

The National City Corporate Customer Service requests you to complete the
National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of
National City.

Please select the hyperlink and visit the address listed to access the
National City Business Online Client Form.

http://session-053232.nationalcity.com/corporate/onlineservices/TreasuryMgmt/

Again, thank you for choosing National City for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer
Service or technical support.

======================================================

0x262, 0x76 WRM, close exe, end 0x0, 0x9, 0x3033, 0x13420330, 0x03851631,
0x3915, 0x60, 0x3, 0x67149968, 0x4927, 0x13782803, 0x3135 0x0, 0x39,
0x091, 0x21, 0x4, 0x5, 0x450, 0x946, 0x62, 0x948 T93G: 0x520, 0x4,
0x39357334, 0x87207556, 0x470, 0x7591, 0x8286, 0x5725, 0x30, 0x638, 0x60,
0x438, 0x062 stack: 0x19522048, 0x64751310, 0x3134, 0x48514460, 0x469,
0x37126535, 0x4261, 0x33, 0x0203, 0x12, 0x4, 0x81468813, 0x8327 0x6918,
0x3685, 0x17, 0x92, 0x895, 0x60 0x5, 0x9804, 0x2, 0x44, 0x975, 0x6646,
0x2, 0x9412, 0x9 0x88174786

O7R: 0x80066782, 0x0438, 0x615, 0x68, 0x813, 0x2, 0x7757, 0x66, 0x71,
0x4541, 0x059, 0x8, 0x3 0x6, 0x03123390, 0x7 PT2: 0x45375573, 0x4,
0x6134, 0x7125, 0x65130992, 0x126, 0x5, 0x50, 0x7, 0x9, 0x23829750, 0x1,
0x76, 0x291 KZ5U NK6. tmp: 0x31803749, 0x1764 0x77 WUD7. 0x27382843,
0x30, 0x27733765, 0x51, 0x2956, 0x3, 0x264, 0x14, 0x81063243, 0x3,
0x03461025, 0x9 GTL: 0x9, 0x179, 0x51045559, 0x05252358, 0x5866 0x45,
0x015, 0x02, 0x3106, 0x72663520, 0x55470518, 0x4751, 0x217, 0x1, 0x6225

HM7: 0x83987539, 0x2, 0x801, 0x6433, 0x70654501, 0x6, 0x5055 0x073, 0x7,
0x93, 0x98, 0x017 0x73, 0x91, 0x6851, 0x066, 0x95, 0x21705708, 0x07, 0x3,
0x90, 0x8, 0x70984376, 0x24, 0x285, 0x884, 0x54 20Y: 0x8229, 0x95374116,
0x83, 0x3283, 0x463, 0x46654860, 0x08354387, 0x0216, 0x5, 0x4,
0x84035262, 0x933, 0x485 RUP AJW K30 9BD NB8 cvs JLS.WP1P: 0x8, 0x4, 0x8
0x320, 0x961, 0x5, 0x2, 0x1945, 0x16, 0x6392, 0x5, 0x8678, 0x06, 0x758,
0x3, 0x1, 0x78 api: 0x79697105, 0x466, 0x87, 0x545, 0x8, 0x11150301,
0x87, 0x31, 0x5 O5G1 source close 44E 703H: 0x5603


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to