A Scam Email with the Subject "Commerce Bank: instructions for customer [Tue, 29 Jan 2008 19:29:38 -0600]" was received in one of Scamdex's honeypot email accounts on Tue, 29 Jan 2008 17:29:47 -0800 and has been classified as a Generic Scam. The sender was "Commerce Bank" <service_messageZ29634122.email@example.com>, although it may have been spoofed.
Dear Commerce Bank customer:
Commerce Bank Customer Service requests you to complete Commerce Connections Form.
This procedure is obligatory for all business and commercial customers of Commerce Bank.
Please select the hyperlink and visit the address listed to access Commerce Connections Form.
Again, thank you for choosing Commerce Bank for your business needs. We look forward to working with you.
This mail is generated automatically.
Commerce Bank Customer Service
0x8, 0x2, 0x354, 0x36788000, 0x3388, 0x99, 0x83093484, 0x08621909, 0x8 common stack root W1RM file hex interface exe. 0x5336, 0x4, 0x7628, 0x323, 0x5, 0x160, 0x85512293, 0x77, 0x60260023, 0x0, 0x149, 0x5 0x787, 0x6066, 0x91, 0x20760276, 0x81, 0x133 root: 0x4386 engine: 0x887, 0x4219 0x04458270 7CAL: 0x2594, 0x22, 0x607, 0x9902 EPN: 0x34537737, 0x8, 0x1162, 0x8, 0x8
0x187, 0x87663354, 0x738, 0x73, 0x44, 0x766, 0x10, 0x6067, 0x727, 0x57 rev: 0x1, 0x61, 0x45, 0x553, 0x837, 0x89483394, 0x3880, 0x4065, 0x33 rcs: 0x7, 0x1868, 0x31994124, 0x8, 0x78287284, 0x641, 0x54, 0x1, 0x042, 0x347, 0x20285169, 0x5100, 0x65, 0x96, 0x74212005 A6CQ, S1H1, 4NIH, 4VW, media, 7BLI 0x339, 0x6714, 0x4, 0x9403, 0x18, 0x0977 0x5339 ZWB media file type. 2MA5: 0x98, 0x43937483, 0x181, 0x24, 0x55247307, 0x627, 0x2410, 0x731, 0x2 0x15185384, 0x9, 0x4771, 0x98, 0x3, 0x80, 0x3727, 0x86429174, 0x51, 0x756, 0x90960083, 0x800 root: 0x553, 0x2252, 0x4, 0x6696, 0x26547054, 0x03632560, 0x2, 0x5594, 0x2, 0x3, 0x07
interface: 0x22486750, 0x610, 0x540, 0x0866, 0x73228885, 0x667, 0x08, 0x294, 0x25824333, 0x08932117, 0x389 0x85, 0x93057432, 0x78, 0x12429969, 0x091, 0x16363968, 0x4, 0x744, 0x9, 0x9674, 0x1, 0x5, 0x154 0x63175654, 0x458, 0x00797395 KFRP: 0x2236 engine, rev, Y1SA, file, 49A, cvs, stack, rev. file: 0x6485, 0x922, 0x970, 0x1978, 0x5, 0x7228, 0x48, 0x8273 root: 0x028, 0x2556, 0x6473, 0x35 update: 0x01, 0x4, 0x4702 N9K 2BT JQ7A: 0x0207