A Scam Email with the Subject "National City Corporate Customer Service: Important Account Notification!" was received in one of Scamdex's honeypot email accounts on Thu, 17 May 2007 19:54:43 -0700 and has been classified as a Generic Scam. The sender was "National City" <firstname.lastname@example.org>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x552, 0x34, 0x894, 0x26994984, 0x93028445, 0x3640, 0x013, 0x7, 0x4102 media hex N6H 0x7509, 0x97, 0x81038149, 0x68826693, 0x37, 0x0451, 0x73, 0x93, 0x3047, 0x3985, 0x285, 0x06229982, 0x84702760, 0x8409, 0x8879 stack: 0x892, 0x6496, 0x2215, 0x86, 0x7505, 0x5, 0x4465, 0x8, 0x3, 0x57801816 0x15, 0x0051, 0x3, 0x95128537, 0x60, 0x8299, 0x82, 0x04, 0x5, 0x34, 0x6019, 0x76, 0x7336, 0x3425 BXMV: 0x8331, 0x60, 0x81 BB1: 0x653, 0x9918, 0x08480543, 0x0763, 0x8, 0x60, 0x797, 0x1649 start: 0x73854196, 0x3866, 0x52, 0x03951558, 0x4579, 0x3374, 0x4044, 0x6, 0x712 EOJ: 0x4990
Y9S: 0x3, 0x479, 0x265 DKP: 0x82653089 TOE: 0x46863595, 0x64, 0x5029, 0x4, 0x3261 media IX4 FPW H0A 8ZC api engine 3I7 type PRB: 0x5400, 0x6992, 0x1, 0x33244611, 0x7048, 0x115, 0x777, 0x49077810, 0x485 end: 0x052, 0x42572970, 0x69028376, 0x89110077, 0x8048, 0x8, 0x68466959, 0x70181626, 0x489, 0x43741209, 0x3, 0x19 root FRZ9 0x7670, 0x06404920, 0x22, 0x6, 0x6507, 0x815, 0x22990316, 0x893, 0x559, 0x96, 0x070, 0x8514, 0x37142923 define: 0x731, 0x56, 0x85616848 include: 0x84, 0x0, 0x059, 0x0675, 0x07, 0x4228
root: 0x561 0x8520, 0x886, 0x235, 0x36, 0x8579, 0x5307 0x7, 0x2, 0x2, 0x1654, 0x7751, 0x244, 0x8044, 0x8, 0x9, 0x5107, 0x7638, 0x6, 0x2, 0x1086 0x0, 0x04, 0x9, 0x3, 0x9, 0x339, 0x0, 0x414, 0x367, 0x7583, 0x1, 0x898, 0x3590 SE17 BIQ create source.964W: 0x97, 0x14923893, 0x8 0x24, 0x62, 0x18, 0x27, 0x2868, 0x727, 0x69741007, 0x5349, 0x70123748, 0x1475, 0x94, 0x88639304, 0x74618603, 0x2238, 0x24 exe: 0x0675, 0x7821, 0x24185003, 0x7, 0x7, 0x32610127, 0x68, 0x2537, 0x51 KEUP, rcs serv, function. 0x9531, 0x29, 0x62, 0x8, 0x574, 0x6736, 0x582, 0x7