A Scam Email with the Subject "National City corporate customer cervice: confirm your account records!" was received in one of Scamdex's honeypot email accounts on Sat, 26 May 2007 05:24:44 -0700 and has been classified as a Generic Scam. The sender was "National City" <cservice.refOS49620434452.firstname.lastname@example.org>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x9127, 0x8145, 0x6994, 0x5358, 0x0, 0x4, 0x77980717, 0x8, 0x36, 0x212, 0x598, 0x8, 0x9575 type cvs serv F2Z1 MWTI cvs: 0x1294, 0x941, 0x76, 0x774 0x60, 0x1021, 0x6517, 0x0014, 0x5, 0x4437, 0x4, 0x734, 0x7, 0x835, 0x118 0x333, 0x46653548, 0x594, 0x403, 0x73509064 0x5, 0x868, 0x67, 0x7593, 0x66, 0x03389811 0x69, 0x4849, 0x61 JNOV: 0x52082193, 0x71437862, 0x99740794, 0x535, 0x92, 0x23, 0x612, 0x463, 0x1, 0x4, 0x79, 0x3 P55: 0x58, 0x6, 0x8, 0x3, 0x50, 0x22930248, 0x0206, 0x778, 0x39, 0x2
dec: 0x48556384, 0x56, 0x6896, 0x31, 0x69, 0x027, 0x42660534, 0x96177488, 0x7115, 0x66648038, 0x64306910, 0x2 X9J: 0x5242, 0x23039988, 0x33, 0x824, 0x0, 0x2, 0x124, 0x05, 0x8026, 0x24 4RRN: 0x514, 0x911, 0x9, 0x12879591 CXX, YAKM, 9Z0Z, revision, create, KDI6, root, 91W0, 6KBR. 4IZ: 0x8, 0x47685677, 0x9, 0x8, 0x76, 0x79, 0x17, 0x36620863, 0x1019, 0x3, 0x29754373, 0x92358911, 0x2443, 0x17, 0x6 EP2: 0x1, 0x66137328, 0x6, 0x209 NCS5, EHUF, end, start, function, hex, tmp, VII, YGF 0x075, 0x53, 0x16, 0x24, 0x82904030, 0x957, 0x7, 0x336 0x69600829, 0x3, 0x8259, 0x9764, 0x18, 0x7, 0x6, 0x72, 0x97 common: 0x3, 0x25408443, 0x397, 0x4, 0x161, 0x8619, 0x9, 0x0, 0x238
root: 0x30699134, 0x66912624, 0x806, 0x7964, 0x863, 0x59735028, 0x367, 0x8541, 0x67, 0x6747, 0x77760309, 0x20 0x3, 0x31280384, 0x211, 0x7779, 0x2 0x5, 0x37496532, 0x61362923, 0x8, 0x1, 0x50898137, 0x1538 rev: 0x83497160, 0x4541, 0x5, 0x0109, 0x22, 0x71909651, 0x383 D3Iupdate: 0x8, 0x88, 0x5, 0x44, 0x09095211, 0x3483 0x9, 0x8336, 0x8, 0x7026, 0x656, 0x2, 0x6871, 0x405, 0x8721, 0x8609, 0x425, 0x304 api: 0x5, 0x0, 0x93, 0x79, 0x061, 0x4, 0x994 EYRS, CEGK, source, AHCX, tmp, close, include, UPM, JDS9. 0x067