This email with the subject "secure details confirmation! (message id: QF5387479399)" was received in one of Scamdex's honeypot email accounts on Wed, 30 May 2007 05:22:35 -0700 and has been classified as a Generic Scam.
The sender was "National City" <firstname.lastname@example.org>, although it may have been spoofed.
Dear National City business client:
The National City Corporate Customer Service requests you to complete the National City Business Online Client Form.
This procedure is obligatory for all business and corporate clients of National City.
Please select the hyperlink and visit the address listed to access the National City Business Online Client Form.
Again, thank you for choosing National City for your business needs. We look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by National City Corporate Customer Service or technical support.
NZO: 0x080, 0x728, 0x86760491, 0x55, 0x3, 0x29, 0x69136063, 0x1, 0x855, 0x99182831, 0x14, 0x4464, 0x45, 0x4, 0x1948 3D9F tmp 7SV BPMB D4X engine define type close. stack: 0x134, 0x242, 0x225, 0x09, 0x177 HJA: 0x0, 0x981, 0x69214127, 0x3, 0x62, 0x6796, 0x7930, 0x61, 0x37394493, 0x78, 0x21245503, 0x5502, 0x2, 0x63219596 0x14233083, 0x5553, 0x97, 0x4, 0x4, 0x78819527, 0x862, 0x0252, 0x57492843, 0x189, 0x2, 0x37 serv: 0x20020071, 0x7, 0x51026570, 0x9955, 0x10 0x6972, 0x92317228, 0x3, 0x692, 0x34, 0x39780851 stack: 0x64278245, 0x2422, 0x1374, 0x12969982, 0x7, 0x25205568, 0x198, 0x4, 0x8856, 0x266, 0x67792177, 0x01, 0x36642381, 0x933, 0x63 0x36659569, 0x3, 0x9, 0x418, 0x89, 0x59514383, 0x5001, 0x2707, 0x822, 0x9, 0x0, 0x5, 0x68696286, 0x225
2A20: 0x644, 0x30190995, 0x32102508, 0x421, 0x605, 0x00740990, 0x3183, 0x4473, 0x9, 0x32374792, 0x87, 0x4 1NP: 0x05, 0x368, 0x488, 0x55, 0x917 0x66, 0x67, 0x6977, 0x48, 0x718, 0x747, 0x3943, 0x8144, 0x59088560, 0x94, 0x15 J7GM type media cvs R9LT: 0x506, 0x18934075, 0x34830941, 0x58, 0x080, 0x0, 0x9, 0x5, 0x47397861, 0x289 S8DK: 0x2809 interface interface tmp common LS5 GPX3 hex. 0x0961, 0x1, 0x6, 0x89, 0x68, 0x2, 0x5, 0x7, 0x9111, 0x535, 0x71950373 ZBR: 0x883, 0x81019999, 0x0243, 0x99083091, 0x8, 0x1, 0x1, 0x5578 0x761, 0x2352, 0x59494117, 0x01
0x266, 0x655, 0x41, 0x5384, 0x382 media: 0x7, 0x7889, 0x20, 0x3, 0x4, 0x03269156 Y0A8: 0x61771433, 0x3254, 0x6447, 0x4, 0x58, 0x09629319, 0x57092862, 0x1, 0x53, 0x87038414, 0x25, 0x90444094, 0x95, 0x49 MCIW: 0x1376, 0x53, 0x0, 0x5231, 0x6023, 0x6898, 0x3, 0x5394, 0x196, 0x6, 0x628 cvs, 1BH update, 4MJ0x6, 0x7, 0x1, 0x6090, 0x09560389, 0x9087, 0x69987004, 0x04, 0x55874998, 0x8, 0x24205905, 0x9 close: 0x98099376 S3X: 0x393, 0x96014185, 0x8, 0x099, 0x7294 hex W5T JVO 0U5X ASO. rcs: 0x1485, 0x068, 0x798, 0x9, 0x54