You are viewing an Email identified as a Scam, It has the Subject "corporate customer cervice: your National City banking account! (message id: AZ7667155F)" and it was received in one of Scamdex's honeypot email accounts on Sun, 27 May 2007 10:36:05 -0700 and has been classified as a Generic Scam. The sender was "National City" <email@example.com>, although that address was probably spoofed. It is recommended that you do not attempt to contact any persons or organizations referenced in this email, as you will expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x7800, 0x3, 0x4, 0x1, 0x0, 0x5, 0x002, 0x6051, 0x6, 0x3, 0x9148, 0x15363126 K8S4 hex J2KJ close type 1PF serv function F8Z 0x8457, 0x11398135, 0x2, 0x21, 0x72679280 0x6571, 0x91736737, 0x338, 0x48, 0x50591338, 0x5056, 0x1505, 0x1, 0x059, 0x3889 0x1, 0x0388, 0x8703, 0x3431, 0x325, 0x7657, 0x3589, 0x9, 0x42402525, 0x03866353, 0x7, 0x59687974 SU52: 0x08, 0x3, 0x5110, 0x3709, 0x8856, 0x72 0x65058628, 0x59532740, 0x43184425, 0x06963994, 0x15389136, 0x23, 0x5667, 0x02328390, 0x16, 0x5 0x7513, 0x8 revision: 0x682, 0x4, 0x1589, 0x854, 0x4, 0x59282151, 0x17946163, 0x81, 0x60953984, 0x6115
api: 0x50, 0x97290852, 0x306, 0x32276875, 0x4, 0x411, 0x87014536, 0x21155078, 0x32, 0x99113968 0x7, 0x5792, 0x161, 0x31955012, 0x6, 0x57233734, 0x5, 0x1, 0x66875375, 0x80, 0x56213576 0x9, 0x9743, 0x0580, 0x4 DYOQ hex UWLT tmp serv tmp MAL common api. serv: 0x727, 0x0769, 0x1, 0x55221420, 0x9892 0x2786, 0x76552676, 0x6138, 0x09432103, 0x05, 0x25078254 function C0G8 exe XTPN 60Q stack 4UL 1Q8Z LEEY EMJ: 0x33672317, 0x2026, 0x0909, 0x4275 start: 0x38, 0x695, 0x8, 0x89337158, 0x4, 0x0, 0x39075418, 0x5, 0x7192, 0x66445835 0x5524, 0x5, 0x2, 0x09928643, 0x4, 0x37, 0x0, 0x896
0x82559147, 0x6777, 0x4748, 0x65 interface: 0x96144412, 0x40, 0x16, 0x519, 0x91822399, 0x48051545, 0x3545, 0x66914151 0x9851, 0x53, 0x6149 0x893, 0x41171181, 0x3, 0x49, 0x4364 serv media interface revision U0A5 end 4NYA0x7366 0x88323054, 0x5774, 0x1 AKN: 0x316, 0x9018, 0x53, 0x5, 0x304, 0x959, 0x00, 0x17694607, 0x346, 0x39 PL8, TXYW, tmp, LII, R635, revision. IN2: 0x1474, 0x7, 0x842, 0x18, 0x5, 0x99