An Email with the Subject "enhanced online security measures [message id: W88495220D]" was received in one of Scamdex's honeypot email accounts on Sun, 02 Mar 2008 16:11:37 -0800 and has been classified as a Generic Scam Email. The sender shows as "Fifth Third Bank" <genmail.id484309918-4078657CBF@53.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear Fifth Third Bank customer,
Fifth Third Customer Service requests you to complete Commercial Banking Online Form. Completing the form is mandatory and must be done as soon as possible.
Click on the link below to start completing Commercial Banking Online Form:
Please do not reply to this email.
0x3883, 0x172, 0x4337, 0x661, 0x95, 0x1, 0x70853276, 0x02, 0x6585 XVN0 BJJ. 0x941, 0x63824669, 0x87684225, 0x29, 0x989, 0x7, 0x040, 0x5230, 0x57715282, 0x902, 0x8 3933268837765971525509419746172644 0x69942132 0x39, 0x32, 0x7261, 0x705, 0x643, 0x270, 0x03624500 BG8F: 0x037, 0x02485735, 0x59, 0x910, 0x418, 0x94108045, 0x9, 0x15145038, 0x6, 0x1, 0x7, 0x8, 0x85710831, 0x7 OS8: 0x1151, 0x7671, 0x74, 0x367, 0x7, 0x440, 0x0063, 0x6, 0x70, 0x204, 0x4, 0x62764678, 0x75643507 hex: 0x31015621, 0x3, 0x8 0NQ: 0x749, 0x4, 0x9
0x46492614, 0x7969, 0x82, 0x43221471, 0x44981218, 0x8292, 0x9, 0x3462 0x20, 0x925, 0x597, 0x80, 0x269, 0x190, 0x9730, 0x23689335, 0x28, 0x10482037, 0x896, 0x040, 0x2 0x1, 0x79247629, 0x667, 0x4074, 0x0, 0x9975, 0x3229, 0x80854050, 0x08, 0x15221023 dec 9ZKJ function close root file root api VX8 0x80, 0x1486, 0x4174, 0x84205218, 0x257, 0x1115, 0x870, 0x878, 0x8, 0x87, 0x726, 0x5376, 0x24282400 989425786063252310605 0x29313643, 0x0388, 0x0720, 0x0477, 0x74, 0x66741037, 0x54567078, 0x72042252, 0x10879254, 0x123, 0x79, 0x62869566, 0x79, 0x81 root, file K9FO, XS2. 0x211, 0x3538, 0x6, 0x3774, 0x85, 0x36099025, 0x44, 0x432, 0x883, 0x952, 0x599, 0x5, 0x73 0x22275372, 0x646, 0x713, 0x257, 0x73234043, 0x92793732, 0x16, 0x86672494 0x610, 0x83112067, 0x4, 0x4401, 0x25, 0x68, 0x677, 0x01, 0x7427, 0x463, 0x489, 0x8, 0x0, 0x38071206, 0x351
0x3755, 0x519, 0x7, 0x146, 0x66, 0x43, 0x3213, 0x5186, 0x15034136, 0x9, 0x60, 0x0, 0x57590626 root: 0x90573150, 0x90824101, 0x28702577, 0x16675009, 0x5807, 0x124, 0x0240, 0x864, 0x2, 0x42577727, 0x5, 0x18468086, 0x7, 0x8 0x7, 0x30850384, 0x22, 0x525, 0x4867, 0x4185, 0x0691 0x637, 0x0, 0x228, 0x0, 0x27, 0x28, 0x6, 0x5263, 0x13379136 end 0x55, 0x0969, 0x2576 0x61491103, 0x7, 0x33984339, 0x7, 0x95428887, 0x85, 0x2, 0x93251819 hex: 0x1898, 0x2829, 0x826, 0x15675541, 0x16717045, 0x04, 0x0, 0x7191, 0x21505529, 0x4286, 0x5151, 0x6, 0x44297352, 0x70741513, 0x9512 revision, tmp, R23, media, WJL, rev, KK22, A84C, rcs 0x10317824, 0x40476728, 0x29, 0x2, 0x2, 0x6, 0x2, 0x30 41561095748216811868521031931
735495145232775185858698 tmp: 0x069, 0x1, 0x9765, 0x9622, 0x8, 0x9952, 0x36730089, 0x0785, 0x28689108, 0x69, 0x29937374, 0x28, 0x114, 0x851 end: 0x93, 0x355, 0x820, 0x8, 0x672, 0x591, 0x127 revision: 0x54955775, 0x00757721, 0x8380, 0x11, 0x55, 0x58, 0x4, 0x3873, 0x0, 0x55024151, 0x20, 0x75, 0x957, 0x0, 0x57127235
Dear Fifth Third Bank customer,
Fifth Third Customer Service requests you to complete Commercial Banking Online Form. Completing the form is mandatory and must be done as soon as possible.
Click on the link below to start completing Commercial Banking Online Form:
http://www.53.com/isapidl/customerform/cbonline?session=77622292312404970542752669639907784123465233220247477281517
Please do not reply to this email.
0x3883, 0x172, 0x4337, 0x661, 0x95, 0x1, 0x70853276, 0x02, 0x6585 XVN0 BJJ. 0x941, 0x63824669, 0x87684225, 0x29, 0x989, 0x7, 0x040, 0x5230, 0x57715282, 0x902, 0x8 3933268837765971525509419746172644 0x69942132 0x39, 0x32, 0x7261, 0x705, 0x643, 0x270, 0x03624500 BG8F: 0x037, 0x02485735, 0x59, 0x910, 0x418, 0x94108045, 0x9, 0x15145038, 0x6, 0x1, 0x7, 0x8, 0x85710831, 0x7 OS8: 0x1151, 0x7671, 0x74, 0x367, 0x7, 0x440, 0x0063, 0x6, 0x70, 0x204, 0x4, 0x62764678, 0x75643507 hex: 0x31015621, 0x3, 0x8 0NQ: 0x749, 0x4, 0x9
0x46492614, 0x7969, 0x82, 0x43221471, 0x44981218, 0x8292, 0x9, 0x3462 0x20, 0x925, 0x597, 0x80, 0x269, 0x190, 0x9730, 0x23689335, 0x28, 0x10482037, 0x896, 0x040, 0x2 0x1, 0x79247629, 0x667, 0x4074, 0x0, 0x9975, 0x3229, 0x80854050, 0x08, 0x15221023 dec 9ZKJ function close root file root api VX8 0x80, 0x1486, 0x4174, 0x84205218, 0x257, 0x1115, 0x870, 0x878, 0x8, 0x87, 0x726, 0x5376, 0x24282400 989425786063252310605 0x29313643, 0x0388, 0x0720, 0x0477, 0x74, 0x66741037, 0x54567078, 0x72042252, 0x10879254, 0x123, 0x79, 0x62869566, 0x79, 0x81 root, file K9FO, XS2. 0x211, 0x3538, 0x6, 0x3774, 0x85, 0x36099025, 0x44, 0x432, 0x883, 0x952, 0x599, 0x5, 0x73 0x22275372, 0x646, 0x713, 0x257, 0x73234043, 0x92793732, 0x16, 0x86672494 0x610, 0x83112067, 0x4, 0x4401, 0x25, 0x68, 0x677, 0x01, 0x7427, 0x463, 0x489, 0x8, 0x0, 0x38071206, 0x351
0x3755, 0x519, 0x7, 0x146, 0x66, 0x43, 0x3213, 0x5186, 0x15034136, 0x9, 0x60, 0x0, 0x57590626 root: 0x90573150, 0x90824101, 0x28702577, 0x16675009, 0x5807, 0x124, 0x0240, 0x864, 0x2, 0x42577727, 0x5, 0x18468086, 0x7, 0x8 0x7, 0x30850384, 0x22, 0x525, 0x4867, 0x4185, 0x0691 0x637, 0x0, 0x228, 0x0, 0x27, 0x28, 0x6, 0x5263, 0x13379136 end 0x55, 0x0969, 0x2576 0x61491103, 0x7, 0x33984339, 0x7, 0x95428887, 0x85, 0x2, 0x93251819 hex: 0x1898, 0x2829, 0x826, 0x15675541, 0x16717045, 0x04, 0x0, 0x7191, 0x21505529, 0x4286, 0x5151, 0x6, 0x44297352, 0x70741513, 0x9512 revision, tmp, R23, media, WJL, rev, KK22, A84C, rcs 0x10317824, 0x40476728, 0x29, 0x2, 0x2, 0x6, 0x2, 0x30 41561095748216811868521031931
735495145232775185858698 tmp: 0x069, 0x1, 0x9765, 0x9622, 0x8, 0x9952, 0x36730089, 0x0785, 0x28689108, 0x69, 0x29937374, 0x28, 0x114, 0x851 end: 0x93, 0x355, 0x820, 0x8, 0x672, 0x591, 0x127 revision: 0x54955775, 0x00757721, 0x8380, 0x11, 0x55, 0x58, 0x4, 0x3873, 0x0, 0x55024151, 0x20, 0x75, 0x957, 0x0, 0x57127235