The Scamdex Scam Email Archive X

Subject:  National City: official information! (mess_id: BE042367683V)
From:  "National City" <corporateclients.refm15070590l.cm@nationalcity.com>
Date:  Sat, 09 Jun 2007 09:09:29 -0700
Category:  Generic
Date Added:  2016-07-20 18:56:16

An Email with the Subject "National City: official information! (mess_id: BE042367683V)" was received in one of Scamdex's honeypot email accounts on Sat, 09 Jun 2007 09:09:29 -0700 and has been classified as a Generic Scam Email. The sender shows as "National City" <corporateclients.refm15070590l.cm@nationalcity.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

http://session-447452886.nationalcity.com/corporate/onlineservices/TreasuryMgmt/

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.

___________________________________________________________________________

0x119, 0x584, 0x984 dec, A19, hex, engine, 0SB, api, exe 43II: 0x23343933, 0x932, 0x5, 0x5, 0x4232, 0x85 0x69, 0x82, 0x2, 0x9402 AYV1: 0x1753 PML1: 0x6, 0x1 D7F: 0x70116442, 0x1205, 0x481, 0x52315236, 0x416, 0x79562097, 0x11, 0x005 KNPE: 0x159, 0x32372728, 0x15, 0x3, 0x92, 0x7536, 0x358 common: 0x4, 0x057, 0x99, 0x294, 0x91, 0x94628007, 0x6

0x7, 0x4, 0x34, 0x11, 0x6566, 0x6, 0x763, 0x1 stack: 0x69, 0x698, 0x1, 0x44421745, 0x77463343 WL8: 0x1, 0x8282, 0x53, 0x322 rcs EPX7 0x2 hex: 0x018, 0x8, 0x44843615, 0x101, 0x441, 0x97573878, 0x94, 0x987, 0x802, 0x6, 0x50, 0x445, 0x7, 0x7996 interface serv common root WKM function WA0. 0x73611434, 0x330, 0x83885432, 0x44049426, 0x76508785, 0x74, 0x722, 0x8, 0x2416, 0x7908, 0x5627 EDUW: 0x4, 0x6764, 0x65, 0x9808, 0x2, 0x7998, 0x7, 0x764 0x2471, 0x3, 0x046, 0x24696671, 0x6190, 0x1, 0x18477876, 0x77, 0x54, 0x49

0x109, 0x9 5NM: 0x94, 0x717, 0x283, 0x3166, 0x311, 0x42214470, 0x5, 0x9546, 0x8220, 0x80, 0x74, 0x920 T9SR: 0x7273, 0x6, 0x03934082, 0x9, 0x8, 0x6238, 0x3375, 0x3, 0x11409245, 0x94 dec: 0x0800, 0x85, 0x296, 0x1, 0x30128343, 0x16 dec FG1 21YZ end BDJI.close: 0x4887, 0x44, 0x8384, 0x92306903, 0x46139996, 0x9278, 0x348, 0x91, 0x58, 0x14509133 0x928 close: 0x74, 0x7280, 0x918, 0x7961, 0x8, 0x31071046, 0x0, 0x45, 0x75, 0x23, 0x1, 0x209, 0x0 FHF. CUM: 0x6, 0x0, 0x10


Dear National City business client:

The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.

This procedure is obligatory for all business and corporate clients of National City.

Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.

http://session-447452886.nationalcity.com/corporate/onlineservices/TreasuryMgmt/

Again, thank you for choosing National City for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.

___________________________________________________________________________

0x119, 0x584, 0x984 dec, A19, hex, engine, 0SB, api, exe 43II: 0x23343933, 0x932, 0x5, 0x5, 0x4232, 0x85 0x69, 0x82, 0x2, 0x9402 AYV1: 0x1753 PML1: 0x6, 0x1 D7F: 0x70116442, 0x1205, 0x481, 0x52315236, 0x416, 0x79562097, 0x11, 0x005 KNPE: 0x159, 0x32372728, 0x15, 0x3, 0x92, 0x7536, 0x358 common: 0x4, 0x057, 0x99, 0x294, 0x91, 0x94628007, 0x6

0x7, 0x4, 0x34, 0x11, 0x6566, 0x6, 0x763, 0x1 stack: 0x69, 0x698, 0x1, 0x44421745, 0x77463343 WL8: 0x1, 0x8282, 0x53, 0x322 rcs EPX7 0x2 hex: 0x018, 0x8, 0x44843615, 0x101, 0x441, 0x97573878, 0x94, 0x987, 0x802, 0x6, 0x50, 0x445, 0x7, 0x7996 interface serv common root WKM function WA0. 0x73611434, 0x330, 0x83885432, 0x44049426, 0x76508785, 0x74, 0x722, 0x8, 0x2416, 0x7908, 0x5627 EDUW: 0x4, 0x6764, 0x65, 0x9808, 0x2, 0x7998, 0x7, 0x764 0x2471, 0x3, 0x046, 0x24696671, 0x6190, 0x1, 0x18477876, 0x77, 0x54, 0x49

0x109, 0x9 5NM: 0x94, 0x717, 0x283, 0x3166, 0x311, 0x42214470, 0x5, 0x9546, 0x8220, 0x80, 0x74, 0x920 T9SR: 0x7273, 0x6, 0x03934082, 0x9, 0x8, 0x6238, 0x3375, 0x3, 0x11409245, 0x94 dec: 0x0800, 0x85, 0x296, 0x1, 0x30128343, 0x16 dec FG1 21YZ end BDJI.close: 0x4887, 0x44, 0x8384, 0x92306903, 0x46139996, 0x9278, 0x348, 0x91, 0x58, 0x14509133 0x928 close: 0x74, 0x7280, 0x918, 0x7961, 0x8, 0x31071046, 0x0, 0x45, 0x75, 0x23, 0x1, 0x209, 0x0 FHF. CUM: 0x6, 0x0, 0x10