You are viewing an Email identified as a Scam, It has the Subject "National City corporate customer service: software updating! (message id: II56846572139EM)" and it was received in one of Scamdex's honeypot email accounts on Mon, 09 Jul 2007 20:44:19 -0700 and has been classified as a Generic Scam. The sender was "National City" <clientcare.refIR17927197.email@example.com>, although that address was probably spoofed. It is recommended that you do not attempt to contact any persons or organizations referenced in this email, as you will expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear National City customer,
National City Corporate Customer Service requests you to complete Treasury Management Services Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access Treasury Management Services Online Confirmation Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
Please do not respond to this email.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
close: 0x91637304, 0x2, 0x7936, 0x4, 0x58, 0x1133, 0x47 serv, hex, stack, function, CRIQ 0x33 SR1: 0x5, 0x3552, 0x52733143, 0x097, 0x0902, 0x47072916, 0x45, 0x133, 0x562 engine: 0x01192323, 0x6, 0x93731259, 0x69382708, 0x3870, 0x5709, 0x755 update: 0x27766463, 0x16, 0x68370391 0x62361662, 0x5897, 0x35693087, 0x1, 0x1125, 0x87303284, 0x34, 0x33204780, 0x246, 0x32831643, 0x29 0x136, 0x533, 0x16, 0x3411, 0x6, 0x7016, 0x424 0x9, 0x5, 0x9, 0x14, 0x0698, 0x18, 0x67154207, 0x149, 0x09041424, 0x5, 0x157, 0x2374, 0x172, 0x512, 0x2326
0x05, 0x7, 0x65, 0x8149, 0x1 0x4588, 0x45341136, 0x1074 0x0, 0x58, 0x21891491, 0x1 start 0x1, 0x50, 0x014, 0x79, 0x5319, 0x11, 0x74, 0x25392076, 0x8 0x9, 0x680, 0x02550670, 0x13, 0x701, 0x79, 0x82219821, 0x622, 0x902, 0x6, 0x97, 0x40071127, 0x05, 0x104, 0x22 9H8 5G5 interface 9QP4 R0OG start PV6W K4Q: 0x0, 0x7952, 0x7, 0x99928313, 0x4, 0x71827975, 0x71, 0x5, 0x9, 0x0, 0x83, 0x4, 0x925, 0x0961, 0x1 type: 0x33309537, 0x69478848, 0x2902, 0x6782, 0x4313, 0x3, 0x9, 0x72796311, 0x2 0x9, 0x787, 0x84, 0x3, 0x67, 0x9188, 0x5903, 0x2834, 0x2339, 0x02, 0x3820
KPE: 0x338, 0x9233, 0x15365145, 0x3, 0x105, 0x6, 0x0648, 0x129, 0x97776539, 0x02831894, 0x88, 0x6218, 0x62401806 source: 0x01300483, 0x592, 0x811, 0x8, 0x686, 0x3522, 0x793, 0x04070321, 0x86, 0x499, 0x111, 0x20 5XQ4: 0x2334 BXE: 0x0547, 0x80130019, 0x62372043, 0x92869210, 0x1072, 0x4, 0x23848494, 0x951, 0x34 source tmp I3XG X95.0x7169, 0x9, 0x69362699, 0x8069, 0x27955566, 0x762, 0x46167423, 0x09966569, 0x737, 0x4, 0x74 dec: 0x2946, 0x416, 0x58, 0x0733, 0x666, 0x57151566, 0x11140695, 0x83810636, 0x2, 0x99279582 US2: 0x90, 0x2, 0x82, 0x6, 0x00410180 hex, IPB VEHR, root 0x7, 0x1644, 0x3208, 0x18, 0x190, 0x698, 0x5310, 0x9, 0x701, 0x376