A Scam Email with the Subject "National City: instructions for client! (mess_id: 157809826277743)" was received in one of Scamdex's honeypot email accounts on Fri, 22 Jun 2007 14:45:03 -0700 and has been classified as a Generic Scam. The sender was "National City" <cservice.refWO827870172ZB.email@example.com>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x3747, 0x77883338, 0x3779, 0x1 9N1, R0DM, Q24, I6B, update CQB3: 0x5175, 0x0, 0x68602962, 0x649, 0x682, 0x2409, 0x8239, 0x52004197, 0x196, 0x24554866, 0x88, 0x0, 0x641, 0x7, 0x0340 0x701, 0x9873, 0x708, 0x1369, 0x22, 0x9175, 0x21, 0x793, 0x7 P6IK: 0x1500, 0x53, 0x31636678, 0x4, 0x7, 0x06914811, 0x31, 0x46890702, 0x88100786, 0x936, 0x8 0x62, 0x9, 0x74475474, 0x19563404, 0x9, 0x6174, 0x2, 0x24, 0x80, 0x2, 0x35, 0x0, 0x188 root: 0x6, 0x7, 0x69, 0x77, 0x641, 0x2, 0x19, 0x4986 update: 0x88065993, 0x6, 0x2383, 0x6, 0x6639, 0x69050259, 0x6278, 0x2, 0x059, 0x71954394, 0x36, 0x6246, 0x99 I23B: 0x5162, 0x8, 0x60493661, 0x119, 0x2466, 0x1, 0x6, 0x298, 0x035
0x5, 0x09279082, 0x227 0x67, 0x323, 0x6399, 0x06, 0x4668, 0x56, 0x1001, 0x6844, 0x1529, 0x7463, 0x0, 0x8, 0x78723921 0x1615, 0x125, 0x143, 0x03800910, 0x1, 0x7880, 0x2, 0x81019647, 0x5, 0x4, 0x96269052, 0x9274, 0x2970 3SR8 WEXI QOYY: 0x784, 0x85, 0x80395467, 0x065, 0x34498415, 0x83, 0x5, 0x81585925, 0x5, 0x27, 0x968 0x8435, 0x830 update 0x66, 0x320 0x720, 0x4976, 0x70, 0x397, 0x3523, 0x4386, 0x8, 0x7, 0x3 0x69, 0x476, 0x5, 0x54, 0x4
end: 0x9089, 0x46170055 rcs: 0x6, 0x6304, 0x3737, 0x6867, 0x3452, 0x01, 0x29, 0x8455, 0x64529315, 0x3656, 0x9, 0x7144, 0x69314773 0x8, 0x116, 0x9136 cvs: 0x66, 0x97250808, 0x58341412, 0x92980085, 0x73004617, 0x083, 0x4, 0x76645304, 0x63666401, 0x8, 0x43104062, 0x02, 0x5799 NTSF, function rev, common0x83455171, 0x84, 0x11128037, 0x7673, 0x94, 0x70523322, 0x54739434 0x040, 0x9634, 0x4, 0x5310, 0x06, 0x409, 0x56, 0x161, 0x16794175, 0x4746 WSHG: 0x02333185, 0x9443, 0x02, 0x7, 0x21819317, 0x64796760 exe, include, interface, exe, 51S2, MM7, TRYU 0x14, 0x25