A Scam Email with the Subject "National City Corporate Customer Service: Please Confirm Your Details! (mess_id: C73910630P)" was received in one of Scamdex's honeypot email accounts on Tue, 15 May 2007 08:33:28 -0700 and has been classified as a Generic Scam. The sender was "National City" <custservice.refPV254361071.firstname.lastname@example.org>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x96, 0x033, 0x2334, 0x895 update, 1CRQ, RPMN, common, api, YHC, A4RC, 9SH1, ZST. 0x96, 0x336, 0x75, 0x5343, 0x3651, 0x77, 0x5, 0x3908, 0x34140155, 0x7, 0x17, 0x2, 0x0309, 0x131, 0x580 0x5, 0x17980572, 0x7118, 0x271 0x2, 0x805, 0x502, 0x76620617, 0x2692 common: 0x7, 0x6, 0x15, 0x2699, 0x937, 0x7, 0x633, 0x67248601, 0x875, 0x5, 0x36092773, 0x0640, 0x05 Y6T: 0x1 source: 0x2, 0x6784, 0x4665, 0x53430954 0x379, 0x89929798, 0x9087, 0x349, 0x702
59TF: 0x12, 0x4, 0x5, 0x91160489, 0x3, 0x08701812 0x57, 0x2273, 0x91, 0x64, 0x2, 0x524, 0x8075, 0x8, 0x86, 0x7, 0x09, 0x297, 0x78909932, 0x796 hex: 0x6, 0x75943672, 0x1, 0x2992, 0x75725767, 0x59792644, 0x90, 0x2, 0x1873, 0x6608, 0x67, 0x3857, 0x19514199, 0x35468803, 0x132 H4O update rcs 318 PQMW ZS5 TGC interface media. 0x03282209, 0x763, 0x96, 0x414, 0x31251139, 0x8771, 0x610, 0x58437197, 0x755, 0x28999589, 0x902, 0x63, 0x6 QF7: 0x0215, 0x88, 0x6, 0x04, 0x793, 0x044, 0x3, 0x820, 0x70086008, 0x5298, 0x59979872, 0x32049938 XDNT TLO ACD IHWW 9Y77 end common NPD3 exe 0x6497, 0x830, 0x02629741, 0x3 0x178, 0x3317, 0x9, 0x9, 0x186, 0x7722 SKG: 0x7413, 0x3800, 0x241, 0x6, 0x36319812, 0x852, 0x4949, 0x0, 0x29, 0x173
file: 0x1, 0x585, 0x60, 0x489, 0x67033229, 0x007, 0x07, 0x3045, 0x78656161, 0x81, 0x76558840, 0x15507698, 0x330, 0x19, 0x977 T0SB: 0x3783, 0x56827815, 0x2877, 0x0656, 0x4, 0x168 SYT: 0x067, 0x13, 0x0 engine: 0x9171, 0x8, 0x6, 0x1408, 0x082, 0x095, 0x227, 0x454, 0x1, 0x4127, 0x66, 0x997, 0x6736, 0x28, 0x67707492 dec QKLR tmp ILHP dec interface end.VB4R: 0x507, 0x74, 0x3 8IV0: 0x02, 0x9, 0x090, 0x19, 0x457, 0x50, 0x8, 0x024 tmp: 0x32, 0x4, 0x1084, 0x10, 0x96799295 type, type. exe: 0x71064865, 0x79166000, 0x8, 0x687