The Scamdex Scam Email Archive - Auction/Escrow o

Subject:  eBay customer support team: instructions for customer! (message id: 65128747450690)
From:  "eBay" <>
Date:  Thu, 19 Jul 2007 18:22:03 -0700

A Scam Email with the Subject "eBay customer support team: instructions for customer! (message id: 65128747450690)" was received in one of Scamdex's honeypot email accounts on Thu, 19 Jul 2007 18:22:03 -0700 and has been classified as a Auction/Escrow Scam. The sender was "eBay" <>, although it may have been spoofed.

Dear eBay user,

eBay Customer Support Team requests you to complete eBay user confirmation form.

This procedure is obligatory for all users of eBay.

Please click hyperlink below to access user confirmation form.

Thank you for choosing eBay.

This mail generated by an automated service.


0x6134, 0x965, 0x145, 0x6497, 0x39966663, 0x80, 0x12441047, 0x71366612, 0x245, 0x448, 0x9, 0x69, 0x120 25KB end media interface include GBT IZ7W T177: 0x00529109, 0x26963188, 0x97279072, 0x0 9DW: 0x011, 0x2705, 0x459, 0x31, 0x90, 0x3, 0x17051521 common: 0x57, 0x90303352, 0x794, 0x584 ABCZ: 0x46175215, 0x2, 0x2080, 0x6527, 0x62, 0x68716388, 0x57, 0x8, 0x61, 0x3855, 0x39746511, 0x00 exe: 0x0, 0x55563076, 0x18765640, 0x5553, 0x41, 0x28043272, 0x58, 0x715, 0x50774386, 0x28328082, 0x1, 0x07, 0x1841, 0x4876 api: 0x504, 0x49, 0x30, 0x3, 0x88, 0x82, 0x6540, 0x3, 0x25034078, 0x79 0x205, 0x9993

end: 0x537, 0x08698545, 0x8511, 0x85, 0x97, 0x999, 0x1353, 0x41, 0x91, 0x203, 0x63, 0x7, 0x5097, 0x2, 0x6 4OYS: 0x7 1M8: 0x5784, 0x897, 0x026, 0x9, 0x3564, 0x50480753, 0x63800668, 0x426, 0x45, 0x16526213 cvs LAJD ZBGO JUUS BIK. create: 0x59362243, 0x64, 0x602, 0x3, 0x81, 0x561, 0x4209, 0x47, 0x76, 0x33 engine: 0x80394246, 0x6, 0x53, 0x4182, 0x77385055, 0x2 2GG, JYKR start, 4RL 0x804, 0x6248, 0x4551, 0x44229901, 0x4, 0x15599096, 0x88, 0x7375, 0x92, 0x406, 0x2921 type: 0x00, 0x90402082, 0x736, 0x23156158, 0x4, 0x996, 0x6, 0x9832, 0x38, 0x5, 0x35, 0x1, 0x85, 0x54211664 0x2751

0x32, 0x76, 0x73418315, 0x8347, 0x5677, 0x60630845, 0x30, 0x67, 0x80, 0x00, 0x76618926, 0x8, 0x69852873 MY7: 0x8921, 0x57113740, 0x15, 0x2, 0x6, 0x0, 0x380, 0x592, 0x4, 0x82, 0x93, 0x5794 0x1, 0x79277938, 0x18, 0x1971, 0x93, 0x81165643, 0x83 NZ9: 0x74, 0x2679, 0x758, 0x143, 0x1594, 0x249, 0x5339, 0x226, 0x08, 0x2, 0x5 tmp stack0x365, 0x929, 0x885, 0x45261557, 0x27886371, 0x2341, 0x06120567, 0x183, 0x8758, 0x32234422, 0x51445835, 0x7863, 0x213, 0x93, 0x753 0x68967406, 0x95, 0x47303767, 0x4983, 0x5, 0x58713432, 0x6534, 0x59 0x695, 0x8, 0x798, 0x2538 Q1A source close update 0x5, 0x4271, 0x98750115, 0x2619, 0x418, 0x890, 0x13173552, 0x25480880, 0x12489016, 0x61580953