The Scamdex Scam Email Archive - Generic o

Subject:  Commerce Bank: instructions for customer [Tue, 29 Jan 2008 19:29:38 -0600]
From:  "Commerce Bank" <service_messageZ29634122.cb@commercebank.com>
Date:  Tue, 29 Jan 2008 17:29:47 -0800

A Scam Email with the Subject "Commerce Bank: instructions for customer [Tue, 29 Jan 2008 19:29:38 -0600]" was received in one of Scamdex's honeypot email accounts on Tue, 29 Jan 2008 17:29:47 -0800 and has been classified as a Generic Scam. The sender was "Commerce Bank" <service_messageZ29634122.cb@commercebank.com>, although it may have been spoofed.

Dear Commerce Bank customer:

Commerce Bank Customer Service requests you to complete Commerce Connections Form.

This procedure is obligatory for all business and commercial customers of Commerce Bank.

Please select the hyperlink and visit the address listed to access Commerce Connections Form.

http://commerceconnections.commercebank.com/cmserver/ccf.cfm?session=328119922807067322730075045862370628872125770294635

Again, thank you for choosing Commerce Bank for your business needs. We look forward to working with you.

This mail is generated automatically.

Commerce Bank Customer Service

0x8, 0x2, 0x354, 0x36788000, 0x3388, 0x99, 0x83093484, 0x08621909, 0x8 common stack root W1RM file hex interface exe. 0x5336, 0x4, 0x7628, 0x323, 0x5, 0x160, 0x85512293, 0x77, 0x60260023, 0x0, 0x149, 0x5 0x787, 0x6066, 0x91, 0x20760276, 0x81, 0x133 root: 0x4386 engine: 0x887, 0x4219 0x04458270 7CAL: 0x2594, 0x22, 0x607, 0x9902 EPN: 0x34537737, 0x8, 0x1162, 0x8, 0x8

0x187, 0x87663354, 0x738, 0x73, 0x44, 0x766, 0x10, 0x6067, 0x727, 0x57 rev: 0x1, 0x61, 0x45, 0x553, 0x837, 0x89483394, 0x3880, 0x4065, 0x33 rcs: 0x7, 0x1868, 0x31994124, 0x8, 0x78287284, 0x641, 0x54, 0x1, 0x042, 0x347, 0x20285169, 0x5100, 0x65, 0x96, 0x74212005 A6CQ, S1H1, 4NIH, 4VW, media, 7BLI 0x339, 0x6714, 0x4, 0x9403, 0x18, 0x0977 0x5339 ZWB media file type. 2MA5: 0x98, 0x43937483, 0x181, 0x24, 0x55247307, 0x627, 0x2410, 0x731, 0x2 0x15185384, 0x9, 0x4771, 0x98, 0x3, 0x80, 0x3727, 0x86429174, 0x51, 0x756, 0x90960083, 0x800 root: 0x553, 0x2252, 0x4, 0x6696, 0x26547054, 0x03632560, 0x2, 0x5594, 0x2, 0x3, 0x07

interface: 0x22486750, 0x610, 0x540, 0x0866, 0x73228885, 0x667, 0x08, 0x294, 0x25824333, 0x08932117, 0x389 0x85, 0x93057432, 0x78, 0x12429969, 0x091, 0x16363968, 0x4, 0x744, 0x9, 0x9674, 0x1, 0x5, 0x154 0x63175654, 0x458, 0x00797395 KFRP: 0x2236 engine, rev, Y1SA, file, 49A, cvs, stack, rev. file: 0x6485, 0x922, 0x970, 0x1978, 0x5, 0x7228, 0x48, 0x8273 root: 0x028, 0x2556, 0x6473, 0x35 update: 0x01, 0x4, 0x4702 N9K 2BT JQ7A: 0x0207


Since you’re here …
we have a small favour to ask. More people are visting Scamdex and Scamalot than ever but advertising revenues are falling fast and we have no 'product' to sell. And unlike many informational websites, we haven’t put up a paywall or membership barrier – we want to keep our site as open as we can. So you can see why we need to ask for your help. Scamdex/Scamalot websites takes a lot of time, money and hard work to keep running. We do this because we hate to see our fellow humans getting scammed out of their hard-earned money by low-lives.
Consider switching off your AdBlocker (if you use one) or contributing directly by one of the links below. Thank you for reading!
fro 2016 to 2017 2016 2017
fro 2016 to 2017 2016 2017