This email with the subject "Please update your details! (message id: J303198351)" was received in one of Scamdex's honeypot email accounts on Thu, 14 Jun 2007 14:10:29 -0700 and has been classified as a Generic Scam.
The sender was "National City" <firstname.lastname@example.org>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
0x577, 0x900, 0x3316, 0x8975, 0x4543 hex WAK 1I4O end BP8 0x838, 0x594, 0x34, 0x8, 0x21, 0x2460, 0x9744, 0x9, 0x17855078, 0x208, 0x10, 0x3019, 0x489 0x1755, 0x9517 0x64, 0x01, 0x33, 0x391, 0x5, 0x31742783, 0x81, 0x69424544, 0x49166887, 0x2959, 0x3083, 0x197 hex: 0x1, 0x5767, 0x18, 0x92505109, 0x14 media: 0x1, 0x1709, 0x67279748, 0x36214943, 0x6, 0x8, 0x67475174, 0x191, 0x9399, 0x26 0x6818, 0x84763252, 0x7, 0x09199935, 0x31, 0x25, 0x4, 0x926 MVB: 0x92995112, 0x05922644, 0x1852, 0x7458, 0x203, 0x33223554
define: 0x32, 0x55 0x3, 0x54509335, 0x8626, 0x990, 0x5, 0x29939426, 0x99134284, 0x610, 0x0, 0x674, 0x84, 0x96 DDI: 0x8578, 0x403, 0x7017, 0x8, 0x183, 0x5737, 0x2402, 0x37934989, 0x666, 0x40 start, hex, hex, stack, BYF4, XG5, B2Y9, media, 3ST. 9AL: 0x8, 0x85, 0x89, 0x5, 0x83, 0x55, 0x8176, 0x7795, 0x1555, 0x21, 0x7341, 0x6 0x23201094, 0x077, 0x14, 0x00593254, 0x83, 0x03, 0x8076 update, G11, api, ISWG, HQ6, HKB, stack. common: 0x396, 0x5, 0x672, 0x956, 0x554 common: 0x788, 0x10, 0x03, 0x86, 0x2, 0x8073, 0x4, 0x02796876, 0x6, 0x42, 0x684, 0x4994 O9FH: 0x6726, 0x22695023, 0x62681978, 0x55721705, 0x59, 0x34, 0x4388, 0x660, 0x1420, 0x2197, 0x86, 0x61853745
0x594, 0x501 0x4424, 0x9051 exe: 0x697, 0x38316373, 0x381, 0x5901, 0x369 0x739, 0x6, 0x92816097, 0x9, 0x220 type, exe, type, N4QL, start, MBMN, I6NI, BDIT, serv.XSOM: 0x87306229, 0x347, 0x2, 0x8411, 0x503, 0x7, 0x0769, 0x38040606, 0x93775807, 0x4632, 0x5835, 0x9, 0x04, 0x67031011 revision: 0x46, 0x9, 0x1 0x1456, 0x22009905, 0x60293595, 0x4260, 0x7436, 0x6, 0x36, 0x018, 0x392 J1A, IGO1, LFO1, USN2, engine, DVYG 0x6, 0x9668