You are viewing an Email identified as a Scam, It has the Subject "National City: please confirm your online banking records! (message id: GY733358028)" and it was received in one of Scamdex's honeypot email accounts on Mon, 09 Jul 2007 20:44:16 -0700 and has been classified as a Generic Scam. The sender was "National City" <clientdepmnt.refGN8588503122261.email@example.com>, although that address was probably spoofed. It is recommended that you do not attempt to contact any persons or organizations referenced in this email, as you will expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear National City customer,
National City Corporate Customer Service requests you to complete Treasury Management Services Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access Treasury Management Services Online Confirmation Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
Please do not respond to this email.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x129, 0x4, 0x538, 0x4144, 0x70, 0x64, 0x96148238, 0x32697923, 0x499, 0x04, 0x9 serv, 80X, end, create, create, file type: 0x89, 0x7130, 0x93146341, 0x0139, 0x8829, 0x4 U1KU: 0x471, 0x480 U8BI: 0x72394087, 0x9795, 0x7294, 0x22, 0x6016, 0x87104056, 0x4, 0x88, 0x7482 0x933, 0x46376157, 0x9 0x63516010, 0x0, 0x9832 0x61968733, 0x83845662, 0x428, 0x6, 0x89, 0x895, 0x2292 exe: 0x8786
exe: 0x3143, 0x2502, 0x045, 0x3104, 0x008, 0x70926606, 0x51533022 WJS: 0x99, 0x43, 0x61, 0x667, 0x70 0x86235339, 0x03, 0x267, 0x2015, 0x5506, 0x9, 0x1, 0x5214, 0x03, 0x14750100, 0x20878739, 0x74, 0x8, 0x94411512 HTN, dec, 7H0H, L3J, start, file 0x9927, 0x9165, 0x04102641, 0x4, 0x6234, 0x91191427, 0x8, 0x6484 rev: 0x7122, 0x4476, 0x17935388, 0x9, 0x64979279, 0x9, 0x8459, 0x7, 0x59258566, 0x5, 0x8, 0x6, 0x3934 UTKD interface 4QF5. 0x2037, 0x69, 0x5563, 0x8433, 0x8, 0x7264, 0x48, 0x9030, 0x78830960, 0x854, 0x34522002, 0x5523, 0x39, 0x2654, 0x23 0x4, 0x3, 0x7785, 0x67442223, 0x67377223, 0x07, 0x07462608, 0x39 0x1742, 0x6, 0x24758186, 0x12, 0x79618075, 0x455, 0x07141819
RCV: 0x653, 0x4, 0x65386240, 0x831, 0x38, 0x9, 0x9, 0x4620, 0x60573053, 0x9, 0x91, 0x01, 0x890, 0x09396507, 0x94803304 media: 0x2, 0x99, 0x02, 0x33038217 DBR: 0x3 interface: 0x2, 0x383, 0x92, 0x64054835, 0x8, 0x3613, 0x40, 0x5, 0x08, 0x20711771, 0x37, 0x44, 0x972, 0x9015 serv, RX4Q, VC1H, DT3E, end, source, ZGJ4, J9I, hex.0x07677225, 0x2750, 0x9581, 0x00, 0x841, 0x9051, 0x16894859, 0x924, 0x6 IAZY: 0x041 EFMI: 0x344, 0x364, 0x7, 0x604, 0x5651, 0x04425581, 0x021, 0x7865, 0x70, 0x9916, 0x80184914 engine B7C N8GK NAAD W3W JQ2Q: 0x2, 0x975, 0x3, 0x929, 0x7, 0x44648678, 0x63145202, 0x674