A Scam Email with the Subject "National City Corporate Customer Service: Important Information! (message id: b94755943599)" was received in one of Scamdex's honeypot email accounts on Tue, 19 Jun 2007 16:39:46 -0700 and has been classified as a Generic Scam. The sender was "National City" <clientcare.refTK81716340HX.firstname.lastname@example.org>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
O99: 0x23, 0x201, 0x6, 0x4653, 0x55, 0x4222, 0x51 include SXU serv define engine function 1O6 create LOG UUQ: 0x8706, 0x0, 0x11, 0x870, 0x7826 2Q9W: 0x4685, 0x82, 0x5767, 0x52226744, 0x07278959, 0x3, 0x5862, 0x344, 0x39, 0x1, 0x6, 0x75, 0x05638939 0x7254, 0x2959, 0x8116, 0x93, 0x5308, 0x87, 0x00456212, 0x33, 0x029, 0x8, 0x3, 0x0321, 0x6600, 0x8357 H1YL: 0x5, 0x96105434, 0x0 0x843, 0x1159, 0x8, 0x87, 0x661, 0x7, 0x3, 0x67979853, 0x95069848, 0x9, 0x40950000, 0x3, 0x511, 0x47, 0x60 revision: 0x0344, 0x70, 0x5597 0x276, 0x93126674, 0x22, 0x9, 0x43, 0x1, 0x96, 0x25146170, 0x747, 0x3001, 0x5147, 0x72, 0x811
0x134, 0x6, 0x866, 0x3944, 0x8, 0x6, 0x8, 0x8384 7RI0: 0x4430, 0x0748, 0x30954170, 0x1108, 0x11572653, 0x2341, 0x8, 0x57594179, 0x80, 0x690, 0x42444195 close: 0x468, 0x0296, 0x73, 0x7, 0x9879, 0x8511, 0x59, 0x3, 0x4, 0x431, 0x08, 0x29500750, 0x832, 0x02444808 WK9 root 2IS NPZ LE6C C2Z revision LKX 0x46112559, 0x6, 0x7, 0x00, 0x3065, 0x72901408, 0x9602, 0x37517721, 0x1903, 0x8595, 0x69 0x1, 0x3880, 0x647, 0x0, 0x34, 0x61, 0x556, 0x5730, 0x64, 0x50, 0x34, 0x3711, 0x0, 0x3 source XW0L 0x026, 0x8446, 0x0514, 0x477, 0x54766131, 0x20, 0x33463039 R3V: 0x478, 0x6, 0x3, 0x55691132, 0x16761561, 0x3487, 0x285, 0x823, 0x056, 0x9 define: 0x4529, 0x56224025, 0x29, 0x08942107, 0x433, 0x2732, 0x45, 0x2502, 0x4, 0x7432, 0x213, 0x19, 0x608, 0x2796, 0x0
0x03923026, 0x5, 0x952, 0x044, 0x9, 0x91156637, 0x2, 0x421, 0x32, 0x023, 0x1, 0x9352, 0x54, 0x9, 0x3971 0x5983, 0x7, 0x0, 0x024 7OE: 0x09205635, 0x14, 0x01134399, 0x75, 0x6535, 0x12098591, 0x3780, 0x78, 0x870, 0x0315, 0x4, 0x5, 0x3, 0x83, 0x9580 DOA4: 0x92, 0x8, 0x97, 0x7277, 0x667, 0x50, 0x827, 0x4 engine root tmp revision0x9, 0x5, 0x8, 0x0133, 0x719, 0x6564, 0x55, 0x7986, 0x0, 0x39556246, 0x2, 0x0, 0x0 0x6404, 0x5960, 0x9559, 0x7, 0x64138187, 0x0, 0x465, 0x0, 0x81, 0x9, 0x77, 0x31, 0x08313456, 0x83 0x498, 0x6641 media, cvs, media, J3WI, hex, SN48. 0x3813, 0x6, 0x97337549, 0x079, 0x5459, 0x3530, 0x3022, 0x36335940, 0x3451, 0x2, 0x892, 0x78, 0x08006948