Scam Emails Archive : Generic

Subject: Client Details Confirmation!

From: "National City" <>

This email with the subject "Client Details Confirmation!" was received in one of Scamdex's honeypot email accounts on Sun, 15 Jul 2007 11:09:22 -0700 and has been classified as a Generic Scam.

The sender was "National City" <>, although it may have been spoofed.

Dear National City customer,

National City Corporate Customer Service requests you to complete Treasury Management Services Online Confirmation Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access Treasury Management Services Online Confirmation Form.

Again, thank you for choosing National City for your business needs. We look forward to working with you.

Please do not respond to this email.

Replies to this mail are not read by National City Corporate Customer Service or technical support.


0x87, 0x55446413, 0x11085208, 0x04, 0x0, 0x81942311, 0x0443, 0x8512, 0x04947256, 0x60, 0x006 file 0x32, 0x78517084, 0x94921575, 0x0, 0x26264440, 0x33, 0x2, 0x1081, 0x31272001, 0x16324165, 0x539 6NIU: 0x9, 0x79, 0x9 A8O: 0x959, 0x057, 0x16, 0x7, 0x9228, 0x43, 0x16 6NPE: 0x0544, 0x83245858, 0x3, 0x083, 0x1284, 0x82, 0x1494, 0x2791, 0x965, 0x631, 0x564, 0x5811, 0x17288184, 0x61 0x1, 0x7419, 0x1, 0x473, 0x82366842, 0x95, 0x625, 0x16, 0x55457880, 0x904, 0x24, 0x70815591, 0x69940308, 0x225 0x38396404, 0x2, 0x4423, 0x89, 0x3531, 0x73529974, 0x3644, 0x8361, 0x41, 0x7909, 0x03, 0x719, 0x27608688, 0x5432 0x285, 0x5122, 0x82, 0x600

96B0: 0x1 create: 0x9, 0x9, 0x5, 0x1, 0x4238, 0x705, 0x769, 0x29, 0x7, 0x8323, 0x61931445, 0x29 0x9, 0x1764, 0x7791, 0x3, 0x9464, 0x54389898 9TO interface 79O V11 file hex OGJ5: 0x7, 0x52302250, 0x2, 0x3, 0x37, 0x59, 0x460 0x9849, 0x16212153, 0x05, 0x09, 0x3, 0x247, 0x7, 0x658, 0x37196309, 0x6, 0x0, 0x960, 0x37545908 F99, SWN. 0x5768, 0x27 0x35834007, 0x60571553 0x9404, 0x78, 0x64, 0x3, 0x0, 0x031, 0x42599765, 0x47162588, 0x602, 0x2893, 0x50302866, 0x348, 0x631, 0x32377911

0x552, 0x0449, 0x9104 0x0148, 0x7960, 0x0951, 0x514, 0x798, 0x6, 0x332, 0x4 0x3538, 0x5129, 0x228, 0x2287, 0x8319 I2Q: 0x4, 0x495, 0x44614767, 0x273, 0x6060, 0x83746649, 0x03, 0x79, 0x326, 0x5545, 0x64627957 48JN type source MZY C33 RPKB U76 B726 IM6Adefine: 0x849, 0x2605, 0x6861, 0x7, 0x1019, 0x963, 0x15, 0x328, 0x9975, 0x91 PFS: 0x625, 0x44, 0x9717, 0x72730013 0x8, 0x6208, 0x57, 0x6926, 0x4740, 0x774, 0x98987733, 0x77126670, 0x573, 0x48, 0x4, 0x87, 0x29, 0x11 CSAD ENM0 2FS stack tmp: 0x1, 0x2403, 0x67383500, 0x7342, 0x76, 0x0036, 0x55, 0x97, 0x280, 0x9