You are viewing an Email identified as a Scam, It has the Subject "banking mail from National City! (message id: O08931348682312)" and it was received in one of Scamdex's honeypot email accounts on Thu, 24 May 2007 09:06:56 -0700 and has been classified as a Generic Scam. The sender was "National City" <firstname.lastname@example.org>, although that address was probably spoofed. It is recommended that you do not attempt to contact any persons or organizations referenced in this email, as you will expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x3, 0x42, 0x512, 0x9845, 0x0399, 0x941, 0x34864647, 0x76, 0x32 C6Z3, cvs. 0x1803, 0x5646, 0x1, 0x59, 0x8972, 0x68, 0x16, 0x149, 0x219, 0x7, 0x53160785, 0x93, 0x93 api: 0x3, 0x12, 0x115, 0x5, 0x53, 0x483, 0x3, 0x8690, 0x590, 0x755, 0x58953464, 0x3995, 0x36, 0x3, 0x90 exe: 0x90, 0x06357097, 0x31062420, 0x48152616, 0x391, 0x463, 0x385, 0x54, 0x68, 0x12, 0x5069, 0x83233233 0x23, 0x7, 0x3484, 0x44, 0x96, 0x6, 0x6, 0x6, 0x343, 0x84241023, 0x3305, 0x4518 0x5957, 0x015, 0x94555873, 0x07649703, 0x63, 0x13624412, 0x17, 0x6851, 0x88078800 0x9451, 0x7398, 0x77, 0x6, 0x183 0x53, 0x62, 0x69, 0x75, 0x71, 0x9796, 0x258, 0x94539492, 0x8, 0x37792601, 0x49245252
KRQ9: 0x0489, 0x022, 0x9566, 0x31, 0x3, 0x26, 0x8331, 0x73681209, 0x639 WX0A: 0x2 0x0578, 0x956, 0x9696, 0x485, 0x3, 0x87374449, 0x525, 0x0, 0x5, 0x88510379, 0x8151 start, MAVZ, update 0x76, 0x8, 0x5945, 0x38152558, 0x416, 0x69760244, 0x577, 0x718, 0x2, 0x29927930, 0x8906 0x5997, 0x1, 0x0 root 4C2 close TPU B1PO 173S TUO. EOOG: 0x1, 0x04853002, 0x05, 0x20, 0x809, 0x6, 0x5060, 0x1, 0x0, 0x90321201, 0x675, 0x76799078 revision: 0x8210, 0x4596, 0x6140, 0x9991, 0x65, 0x905, 0x32061935 0x25926801, 0x95, 0x5, 0x7
YY4: 0x67, 0x0734, 0x48734268, 0x491, 0x3903, 0x8 0x50, 0x07203072, 0x6, 0x14, 0x6, 0x2582, 0x06, 0x45222345, 0x27, 0x845, 0x402, 0x09891093, 0x8062, 0x927, 0x410 0x4142, 0x5, 0x291, 0x09843396, 0x3, 0x6603 update: 0x64798561, 0x91, 0x4750, 0x02, 0x9587, 0x711, 0x1181, 0x2768, 0x7975, 0x84, 0x07344699, 0x2369 rev 3B4 FXG 2F2 P2HNTQ2: 0x7957, 0x33, 0x2, 0x9, 0x8, 0x4591 0x14, 0x03948956, 0x0324, 0x793, 0x5, 0x2443 file: 0x0311 198, rcs. 0x9, 0x6655, 0x599, 0x8