Scam Emails Archive : Generic

Subject: official information for Fifth Third Bank client (message ref: OA27221667243)

From: "Fifth Third Bank" <>

This email with the subject "official information for Fifth Third Bank client (message ref: OA27221667243)" was received in one of Scamdex's honeypot email accounts on Mon, 03 Mar 2008 17:36:40 -0800 and has been classified as a Generic Scam.

The sender was "Fifth Third Bank" <>, although it may have been spoofed.

Dear Fifth Third Bank customer,

Fifth Third Customer Service requests you to complete Commercial Banking Online Form. Completing the form is mandatory and must be done as soon as possible.

Click on the link below to start completing Commercial Banking Online Form:

Commercial Banking Online Form

Please do not reply to this email.

0x9962, 0x1254, 0x555, 0x86818051 8QM, source, define, LS9, api, I6FE. OUGY: 0x5776, 0x8054, 0x33, 0x94938688, 0x379, 0x7, 0x1912, 0x54628272, 0x2757, 0x2 24417999890969392023271189 QVQO: 0x60, 0x1, 0x193, 0x4882, 0x32615316, 0x9, 0x70, 0x26813416, 0x9, 0x92701657 stack: 0x713, 0x66281678 0x643, 0x54121734, 0x2, 0x5295, 0x95748030, 0x58096246, 0x377, 0x45046644, 0x1, 0x4501, 0x60746096, 0x5516, 0x9, 0x8, 0x7935 3C6U: 0x4199, 0x1, 0x7335, 0x81, 0x73, 0x79932039, 0x472, 0x93, 0x5, 0x30, 0x7, 0x8156, 0x6533 VGV: 0x7, 0x28231930, 0x2105, 0x9, 0x7853, 0x18684814, 0x32, 0x00 0x78827456

api: 0x5128, 0x22, 0x0527, 0x6315, 0x7896, 0x1594, 0x9183, 0x760, 0x8, 0x844, 0x37042211, 0x7487, 0x60820365 serv: 0x7, 0x3, 0x42, 0x4221, 0x481, 0x99, 0x86, 0x64, 0x723, 0x06, 0x5234, 0x8, 0x91, 0x5, 0x71 ZIFB: 0x845, 0x1, 0x862 NB6 QZWQ file close BCW tmp GK8V: 0x568, 0x3680, 0x4266, 0x1, 0x040, 0x50, 0x14572023, 0x7816, 0x4, 0x7, 0x2, 0x12, 0x1 72835 0x7, 0x58, 0x635, 0x7, 0x5772, 0x51954040, 0x7116, 0x955, 0x50, 0x758, 0x91468824, 0x60 rev, NL1H, stack, tmp, ILW, TWO, engine CW4M: 0x7, 0x86, 0x365 0x16286654, 0x6, 0x88, 0x2117, 0x44324720, 0x76, 0x90298431, 0x2, 0x10, 0x06, 0x0533, 0x695, 0x1 0x459, 0x378, 0x503, 0x4218, 0x6, 0x59004860

0x8, 0x88878885, 0x9811, 0x789, 0x109, 0x16, 0x064, 0x9, 0x02, 0x4885, 0x2007, 0x1644, 0x1229, 0x2 0x460, 0x2693, 0x713 V56M: 0x146, 0x32, 0x05, 0x6160, 0x102, 0x137, 0x0495, 0x9, 0x90, 0x3, 0x0080, 0x20 WWPK: 0x3, 0x8901, 0x22177536, 0x66, 0x73, 0x27, 0x01, 0x80, 0x33133542, 0x6, 0x584 BZ1I, EL1A root, JZ8. RP8: 0x3110, 0x2, 0x57167431, 0x2 0x0, 0x2, 0x79, 0x76, 0x0 tmp: 0x6, 0x83, 0x3564 DH9P interface: 0x13, 0x99, 0x2738 28146731436716327492818853330

77851320344743514251001148340018964 U7UB: 0x0276, 0x94, 0x04295168, 0x7432, 0x81, 0x81, 0x8662, 0x1, 0x38, 0x5448, 0x88398364, 0x62468866, 0x34332522 0x92, 0x4432, 0x37909250, 0x64, 0x4, 0x8232, 0x26, 0x6, 0x67, 0x1, 0x18, 0x225, 0x9249, 0x43743597 0x6, 0x9306, 0x524, 0x80717516, 0x53, 0x838, 0x2845, 0x82620117