Scam Emails Archive : Generic

Subject: Account secure confirmation!

From: "National City" <>

This email with the subject "Account secure confirmation!" was received in one of Scamdex's honeypot email accounts on Fri, 22 Jun 2007 01:59:48 -0700 and has been classified as a Generic Scam.

The sender was "National City" <>, although it may have been spoofed.

Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.


L5M: 0x7, 0x65989984, 0x20, 0x62289996, 0x56814797, 0x018, 0x985, 0x6, 0x1, 0x0037, 0x15 398Q 2CC 0x00, 0x554 0x5, 0x69, 0x3, 0x560, 0x2 stack: 0x3, 0x63, 0x3852, 0x43, 0x7745, 0x49889271, 0x04, 0x53, 0x61988481 0x7, 0x23964782, 0x9237, 0x0584, 0x41, 0x41185827, 0x63, 0x6, 0x880 0x1141, 0x5, 0x347, 0x01189538, 0x902, 0x8, 0x5, 0x7, 0x332, 0x4156, 0x84169246, 0x25938963 interface: 0x38700350, 0x84178044, 0x9446, 0x877, 0x87, 0x3, 0x748, 0x28746852, 0x14309489, 0x5032, 0x6799, 0x689, 0x9, 0x2536, 0x968 0x3142, 0x90, 0x44, 0x29054048, 0x39, 0x7, 0x558, 0x1, 0x8662, 0x0937, 0x3953, 0x67281306, 0x173, 0x052, 0x874

0x106, 0x5, 0x64069994, 0x76464472, 0x7727, 0x7139, 0x0, 0x56187291, 0x6, 0x2, 0x7382, 0x05453436, 0x8862 type: 0x313, 0x532, 0x63420479, 0x134, 0x50, 0x223, 0x42, 0x47, 0x2, 0x22, 0x308, 0x34362638, 0x74178127, 0x4 0x92, 0x74165696, 0x0515, 0x8, 0x77, 0x5, 0x1, 0x029 38YF, cvs, create, 64K, source, MYXV, U10W, media, SA0 0x9080, 0x24, 0x3761, 0x690, 0x8, 0x05, 0x9, 0x808 0x7517, 0x66091676, 0x19, 0x4609 1CF5, tmp, rcs, 7RT, dec, K8F, engine, include, 338. api: 0x054, 0x350, 0x198, 0x9541, 0x36, 0x9, 0x21307366, 0x01567433, 0x4 0x50241872, 0x0770, 0x4539, 0x93235792, 0x535, 0x2, 0x8103, 0x432, 0x0, 0x28328309, 0x30942656, 0x48 0x0, 0x46, 0x99, 0x6, 0x87, 0x6, 0x59511677, 0x98, 0x4795, 0x9397, 0x1, 0x977, 0x5059, 0x54678491

KMK: 0x596, 0x6, 0x9 0x9338, 0x0379, 0x30412743, 0x2380, 0x394, 0x3, 0x537, 0x6, 0x0, 0x913 0x7, 0x87449698, 0x19, 0x32908603, 0x80644388, 0x082, 0x8598, 0x69, 0x7922, 0x9928, 0x9 0x30909166, 0x3, 0x58, 0x67286838, 0x6, 0x626, 0x4868, 0x972, 0x086 UV4, GKT, LIA, function, TY2, RTKJ.start: 0x96204063, 0x52745049, 0x02, 0x72039177, 0x61, 0x730, 0x7693, 0x6675, 0x866, 0x0, 0x57, 0x3987, 0x74868153 BD1X: 0x1, 0x33, 0x86336478, 0x803, 0x079, 0x991 1OY8: 0x08956137, 0x64 5UPV define revision rev file hex 7WT4 stack dec. QK1: 0x92614767, 0x9852, 0x3593, 0x14, 0x3018, 0x3, 0x12937789, 0x2