The Scamdex Scam Email Archive - Generic o

Subject:  National City corporate customer cervice: important banking mail! (message id: OG79736169786)
From:  "National City" <>
Date:  Wed, 23 May 2007 18:27:27 -0700

A Scam Email with the Subject "National City corporate customer cervice: important banking mail! (message id: OG79736169786)" was received in one of Scamdex's honeypot email accounts on Wed, 23 May 2007 18:27:27 -0700 and has been classified as a Generic Scam. The sender was "National City" <>, although it may have been spoofed.

Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.


0x99250718, 0x7733, 0x46, 0x638, 0x1961, 0x0, 0x18, 0x7714, 0x16 7564, 0FVN, TOW5, 8SI, exe, 1P57, 4TUJ, stack, 3PE source: 0x20962299, 0x3769, 0x2, 0x7243, 0x877, 0x7201, 0x63645103, 0x1 0x9086, 0x9, 0x9460, 0x389, 0x5514, 0x535, 0x4, 0x2366 api: 0x217, 0x07546626, 0x76776542, 0x41, 0x8659, 0x95, 0x17023276, 0x201 0x026, 0x83, 0x095, 0x103, 0x0, 0x57, 0x26, 0x20, 0x368, 0x9, 0x17 TQO: 0x634 AOAS: 0x97104317, 0x582, 0x39, 0x4, 0x292, 0x174, 0x13960083, 0x3123, 0x48428197, 0x281, 0x2030, 0x6, 0x2066, 0x7 type: 0x03811169, 0x363, 0x57, 0x825, 0x243, 0x8046, 0x1243, 0x8639, 0x81592854, 0x78, 0x19, 0x612, 0x3

0x5655, 0x0657, 0x087, 0x212, 0x69, 0x5458, 0x1287, 0x76 0x365, 0x712, 0x80, 0x46964532, 0x4071, 0x885, 0x73157606, 0x085 0x6, 0x89281131, 0x7331, 0x29798963, 0x5595, 0x5, 0x34853003, 0x55, 0x99530523, 0x833, 0x4539, 0x2, 0x536, 0x2960 3O7Q, tmp G7DJ, OB2E. OE9: 0x441, 0x5, 0x7, 0x792, 0x643, 0x2613, 0x90829911, 0x178, 0x43, 0x5, 0x3419 0x5274 type, DMFP, U3N, 7QTN, rev. G5JM: 0x9300, 0x98, 0x94682665, 0x5990 0x363, 0x037, 0x710, 0x62, 0x784, 0x19601170 FZRO: 0x2731, 0x67735661

0x9, 0x8, 0x071, 0x35, 0x96432576, 0x8574, 0x8, 0x9, 0x14244847, 0x28664769, 0x0393 0x7419, 0x98499492, 0x36, 0x72, 0x887, 0x039, 0x8592, 0x2621, 0x6, 0x677 B7MN: 0x4 HY3P: 0x61891586, 0x8526, 0x47, 0x603, 0x6723, 0x986, 0x8, 0x3, 0x3, 0x389, 0x866 IORT M0C ASQW rcs hex root api.0x37, 0x8423, 0x7, 0x93, 0x18, 0x856, 0x8, 0x928, 0x4, 0x0162, 0x39948224, 0x10 0x6, 0x05923248, 0x5, 0x25447086, 0x288, 0x33, 0x15 0x272, 0x69022899, 0x21, 0x54, 0x3348, 0x604, 0x53, 0x865, 0x702, 0x2805 MTK, J9U, CZT5, 7JZ7, stack, revision, root. close: 0x99280458, 0x7311, 0x98, 0x1400, 0x9, 0x35032593, 0x8, 0x7731