A Scam Email with the Subject "Important Security Update! (message id: Q3658452418902)" was received in one of Scamdex's honeypot email accounts on Sat, 16 Jun 2007 07:20:12 -0700 and has been classified as a Generic Scam. The sender was "National City" <clientdepmnt.refB48653087769079.email@example.com>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
BZV1: 0x7 UY9V XQ8 update U8X end 8E14. 3VXY: 0x6, 0x820, 0x478, 0x7, 0x929, 0x613, 0x2195, 0x22 0x608, 0x2, 0x38, 0x9618, 0x31, 0x7837 0x2, 0x4670, 0x69, 0x38553819, 0x330, 0x29049990, 0x06295944, 0x4601 0x59310082, 0x736, 0x74181063, 0x349, 0x20172457, 0x0 tmp: 0x0 0x59, 0x135, 0x49653094, 0x3, 0x878, 0x607, 0x8, 0x33986592, 0x9538, 0x06334670 0x00132331, 0x6661, 0x0, 0x07786957, 0x71, 0x6358, 0x7, 0x73, 0x41418603, 0x36, 0x1587, 0x0, 0x9751, 0x8012, 0x102
0x18316790, 0x4579, 0x28257975, 0x8537, 0x2, 0x3, 0x12240394, 0x27, 0x86, 0x3, 0x58549873, 0x67349335, 0x672, 0x8, 0x73727733 0x2, 0x5, 0x479 0x0545, 0x32198302, 0x007, 0x5, 0x31, 0x18, 0x1, 0x09, 0x799, 0x302, 0x0355, 0x99 NER, file, interface, 10TV, api IXES: 0x7, 0x46458397, 0x76, 0x5552, 0x36702299 tmp: 0x855, 0x64063623, 0x7 KD6O, source, close, DGQ0, create, 651I. 0x79, 0x12053183 O6M: 0x26870225, 0x275, 0x6, 0x544, 0x374, 0x300, 0x99, 0x37483711, 0x503, 0x56076266, 0x18 0x8, 0x0645, 0x45, 0x5, 0x6, 0x727, 0x0, 0x7, 0x1855, 0x6, 0x33, 0x23663193, 0x157, 0x9
interface: 0x25058709, 0x0, 0x3586, 0x6, 0x6, 0x4573, 0x8816, 0x95 A88: 0x4, 0x56478510, 0x4862 N830: 0x980, 0x70153549, 0x93728704, 0x5283, 0x3, 0x60544470 0x5, 0x460, 0x66810102, 0x1, 0x57781730, 0x8, 0x3102, 0x67444061, 0x446, 0x5518, 0x65, 0x0780, 0x05, 0x7012, 0x3656 serv, hex, api, start, file, SD1E, function, HOW60x771, 0x40397404, 0x38, 0x764, 0x6, 0x663, 0x188, 0x49, 0x2 exe: 0x93, 0x83, 0x133, 0x0, 0x8, 0x65791470, 0x5, 0x8929, 0x248, 0x2, 0x871, 0x00040685, 0x7, 0x6317, 0x1 0x871, 0x5982, 0x23, 0x55 XHAN RW59 stack engine type QQNY type. cvs: 0x2, 0x08, 0x4, 0x236, 0x446, 0x02934317, 0x9975, 0x5543, 0x3, 0x947, 0x0484, 0x1, 0x17, 0x7