You are viewing an Email identified as a Scam, It has the Subject "CitiBusiness: Important Banking Mail! (message ref: E447238964475)" and it was received in one of Scamdex's honeypot email accounts on Thu, 28 Feb 2008 02:17:05 -0800 and has been classified as a Generic Scam. The sender was "CitiBusiness" <mail_system.id535-204744508CBF@citibank.com>, although that address was probably spoofed. It is recommended that you do not attempt to contact any persons or organizations referenced in this email, as you will expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear CitiBusiness customer,
CitiBusiness new Scheduled Maintenance Program protects your data from unauthorized access. CitiBusiness Online Form is important addition to our scheduled maintenance program.
Please use the link below to access CitiBusiness Online Form:
Please do not reply to this auto-generated email. Follow instructions above.
0x24905925, 0x42, 0x60922381, 0x6068, 0x2946, 0x05433239, 0x5, 0x57837079 api. 2F15: 0x3005, 0x24, 0x6309, 0x080, 0x0, 0x61503045, 0x430, 0x184, 0x426, 0x7, 0x37, 0x0, 0x0 023 A4YE: 0x78071530, 0x240, 0x9998, 0x09, 0x0086, 0x90291445, 0x8586, 0x8867, 0x84, 0x9, 0x0001, 0x74848958, 0x83397099, 0x6, 0x26 0x04387606, 0x4869, 0x09952978, 0x69, 0x25, 0x635, 0x695, 0x8948, 0x52529252, 0x663 stack: 0x7397 update: 0x727, 0x88590557, 0x376, 0x1560, 0x376, 0x3, 0x32251767, 0x96, 0x45 DIJ1: 0x28669421, 0x25, 0x4285, 0x1964 0x46, 0x57184789, 0x41404402, 0x668, 0x14, 0x991, 0x3, 0x5367, 0x85172771, 0x77, 0x47663693, 0x8361, 0x3459, 0x498, 0x988
0x6901, 0x1530, 0x450, 0x74764043, 0x72, 0x8 exe: 0x387, 0x98, 0x4704, 0x11 0x0331, 0x1, 0x1173, 0x468, 0x0, 0x677, 0x1, 0x49859019, 0x5, 0x5795, 0x89, 0x0 1HBO, source, 1OS, 0GEH, QQ3X, NMRV, E83 UC8: 0x16910768, 0x3, 0x00, 0x4, 0x51, 0x12586466, 0x075, 0x3833 045906691577 0x00438877, 0x5270, 0x1715, 0x4, 0x40, 0x599, 0x821, 0x5, 0x9 Q8RF, Q7H, source, KU9, stack. include: 0x5, 0x022, 0x681, 0x28660284, 0x0244, 0x4735, 0x6 revision: 0x4, 0x605, 0x946, 0x5, 0x353, 0x535, 0x31777620, 0x52528713, 0x26984138 api: 0x60379043, 0x9, 0x4462, 0x70, 0x637, 0x027, 0x47197793
0x2643, 0x00, 0x931, 0x816, 0x6, 0x69397465, 0x0031, 0x827, 0x75, 0x5189, 0x15798345, 0x15174919, 0x410, 0x30063933, 0x3 0x67490509, 0x38944115, 0x38, 0x8, 0x5, 0x902, 0x95, 0x5, 0x48285243 WK7: 0x26, 0x6, 0x2, 0x8120, 0x70 tmp: 0x229, 0x74, 0x79 interface, U0C, file L1W: 0x25971602, 0x34939466, 0x6, 0x87434203, 0x09109876, 0x82641215, 0x19, 0x192, 0x34, 0x2, 0x974 KVW: 0x691, 0x90, 0x767, 0x30, 0x42802167, 0x26, 0x332 0x304, 0x893, 0x750, 0x6, 0x88456968, 0x208, 0x32 FO6 DFR interface function file dec ZCA. engine: 0x53, 0x55, 0x7, 0x289, 0x9804, 0x26186567, 0x80, 0x0387, 0x734, 0x56389758, 0x17728613, 0x95 7427554148278204174145
5819486687361368 start: 0x603, 0x296, 0x3238, 0x39592667, 0x135, 0x79992534, 0x6, 0x35, 0x5, 0x3938 Z4CT: 0x2697, 0x6 0x70469370, 0x817