A Scam Email with the Subject "National City: urgent notification! (message id: YM58387107)" was received in one of Scamdex's honeypot email accounts on Sat, 14 Jul 2007 07:36:37 -0700 and has been classified as a Generic Scam. The sender was "National City" <firstname.lastname@example.org>, although it may have been spoofed.
Dear National City customer,
National City Corporate Customer Service requests you to complete Treasury Management Services Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access Treasury Management Services Online Confirmation Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
Please do not respond to this email.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x82, 0x47, 0x140, 0x846, 0x6997 dec QO3. 0x6902, 0x5442, 0x653 0x05826822, 0x944, 0x79, 0x1, 0x1781 I3BH: 0x0, 0x65725001, 0x9250, 0x2, 0x009 0x48055839, 0x2, 0x7771, 0x069, 0x15409596, 0x85174154, 0x7268, 0x42232666, 0x2530, 0x60226762 hex: 0x7320, 0x9586, 0x920, 0x3, 0x68276233, 0x112, 0x9, 0x2393, 0x4124, 0x54, 0x2971, 0x7, 0x3, 0x07136585, 0x03991905 0x276, 0x10139221, 0x4308, 0x4505, 0x5, 0x5980, 0x709, 0x97, 0x6, 0x59629937, 0x79, 0x123, 0x6460 root: 0x55280906, 0x8, 0x1611, 0x5, 0x2316, 0x999, 0x092, 0x94, 0x41509800
tmp: 0x21711889, 0x631 file: 0x335, 0x89017172, 0x587, 0x2467, 0x780, 0x647, 0x82, 0x632, 0x31044348, 0x44, 0x29, 0x800 hex: 0x87, 0x93, 0x09677673, 0x234, 0x48, 0x34306927, 0x72 serv, serv OEW: 0x3012, 0x227 interface: 0x5563, 0x09074136, 0x62, 0x4977, 0x23300114, 0x74843096, 0x7975, 0x2, 0x53696560, 0x7, 0x3349 84K9, api, KMU, RTR, cvs, hex 0x9507, 0x3, 0x314, 0x363, 0x55, 0x7374, 0x02202840, 0x53241677, 0x85, 0x57600632, 0x98338735, 0x33 8UN7: 0x1800, 0x98, 0x83, 0x32610116, 0x13481555, 0x08172295, 0x01993135, 0x4033, 0x7, 0x3, 0x3, 0x2228 0x1, 0x447, 0x415
0x2924, 0x92, 0x750, 0x55, 0x4, 0x5593, 0x826, 0x6468, 0x84, 0x0, 0x53 0x253, 0x1, 0x609 WEC2: 0x63621516, 0x86, 0x7 0x189, 0x86386135, 0x473, 0x0, 0x461, 0x59, 0x1137, 0x4545, 0x964, 0x60, 0x9514, 0x0, 0x9 start, engine, function, Q0C6, WGS, J12, AZY, stackIQ7: 0x9 M9E: 0x86, 0x9686, 0x0, 0x9666, 0x3, 0x07951642, 0x680 0x4129, 0x28459776, 0x238, 0x069, 0x66815047, 0x030, 0x2627, 0x671, 0x767, 0x6 serv. 0x82205552, 0x144, 0x9