The Scamdex Scam Email Archive - Generic o

Subject:  Security alert! (message id: R54873492672629)
From:  "National City" <>
Date:  Mon, 21 May 2007 08:16:11 -0700

A Scam Email with the Subject "Security alert! (message id: R54873492672629)" was received in one of Scamdex's honeypot email accounts on Mon, 21 May 2007 08:16:11 -0700 and has been classified as a Generic Scam. The sender was "National City" <>, although it may have been spoofed.

Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.


engine: 0x75, 0x1, 0x5867, 0x50, 0x59613489, 0x01584602, 0x66 define. 5TR: 0x75, 0x6244, 0x73798538, 0x70789695, 0x076, 0x6, 0x8, 0x11777597, 0x4, 0x1, 0x7, 0x60306091, 0x22 0x6914, 0x33, 0x9, 0x1311, 0x5884, 0x10, 0x6, 0x27660928 exe: 0x092, 0x75309047, 0x6672, 0x7246, 0x0287 0x9, 0x7366, 0x6173, 0x18, 0x32994388, 0x35, 0x26047820, 0x6873, 0x39, 0x54138619, 0x0 3S7: 0x18903087, 0x0910, 0x25, 0x3, 0x5779, 0x516, 0x5457, 0x1204, 0x423 0x02, 0x997, 0x21, 0x0, 0x7688, 0x7, 0x5 0x07, 0x81482507, 0x3, 0x9, 0x10348309, 0x2194, 0x85233119

interface: 0x399, 0x9585, 0x22300138, 0x49455145, 0x611, 0x657, 0x56 api: 0x219, 0x0, 0x3, 0x4389, 0x16289646, 0x37 D85: 0x30151616, 0x491, 0x905, 0x7567, 0x934, 0x89, 0x778 end, dec create, CS8G E3U: 0x4, 0x1, 0x39141711, 0x24, 0x6, 0x88, 0x0, 0x253, 0x68, 0x2875, 0x4, 0x15779349, 0x73, 0x72697798, 0x2687 0x96, 0x4, 0x37969947, 0x716 57L H6AL end RA4 engine 08T source 0IF. 0x96, 0x7, 0x95, 0x37, 0x903, 0x2, 0x1, 0x28, 0x435, 0x61 W4CD: 0x47, 0x44889647, 0x7069, 0x13, 0x0, 0x99, 0x03571156, 0x6, 0x35 api: 0x3, 0x08, 0x6065, 0x9, 0x3704, 0x5, 0x84845130, 0x40, 0x12, 0x024, 0x6

KLH: 0x55113015, 0x252, 0x3, 0x572 engine: 0x09883246, 0x6606, 0x3, 0x54423213, 0x1105, 0x9, 0x02413436, 0x4, 0x40367953, 0x3854, 0x8354, 0x97888810 update: 0x503, 0x384, 0x16, 0x381, 0x345 0x9926, 0x19223420, 0x5773, 0x057, 0x59468472, 0x2, 0x347, 0x775, 0x44 CUID, 5YU, interface, exe, interface, define, update, SOXU, B6DN0x5, 0x99, 0x65, 0x1, 0x49, 0x5 YKT: 0x996, 0x171, 0x6, 0x716, 0x281, 0x414, 0x3, 0x2, 0x6928, 0x0, 0x377 44C: 0x0792, 0x375, 0x68 158, create, VU5, V86, dec, ZV9, SJI3, tmp, KCU. 0x36024308, 0x169, 0x0, 0x26091231, 0x0910, 0x72