An Email with the Subject "Confirmation Required! (message id: v62810262743)" was received in one of Scamdex's honeypot email accounts on Tue, 17 Jul 2007 12:54:22 -0700 and has been classified as a Generic Scam Email. The sender shows as "SunTrust Bank" <clientdepmnt.refpp9855739571h.nf@suntrust.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear SunTrust Bank customer,
SunTrust Client Service Team requests you to complete Online Treasury Customer Form.
This procedure is obligatory for all business and corporate clients of SunTrust Bank.
Please click hyperlink below to access Online Treasury Customer Form.
http://onlinetreasurymanager-id981932425.suntrust.com/ibswebsuntrust/cmserver/customer.cfm
Thank you for choosing SunTrust Bank for your business needs.
Please do not respond to this email.
This mail generated by an automated service.
=============================================================================================================
0x0, 0x0, 0x297, 0x6910, 0x846, 0x1810, 0x7, 0x52420996, 0x7, 0x23, 0x99, 0x16, 0x90128041, 0x0563, 0x6 IPR 2PPL rcs interface NWR 31YF. root: 0x191, 0x7, 0x55, 0x99, 0x0, 0x72, 0x9862, 0x0165, 0x809, 0x0, 0x3, 0x02846604, 0x66 serv: 0x29695847, 0x7749, 0x8, 0x19170696, 0x08632374, 0x8384, 0x12, 0x975, 0x9168, 0x5, 0x5 24E8: 0x170, 0x0286, 0x2, 0x1456, 0x0 W4AK: 0x1944, 0x2451, 0x00, 0x78, 0x85, 0x5 0x24, 0x6417, 0x2021 KV7G: 0x829, 0x4, 0x926, 0x5, 0x4, 0x433, 0x5, 0x5716, 0x48, 0x09, 0x60, 0x29 0x22976435, 0x4655, 0x9980, 0x13479544
0x71, 0x3, 0x418, 0x1, 0x20613077, 0x2, 0x4739, 0x48250793 0x9, 0x37, 0x47908067, 0x3, 0x96, 0x8630, 0x97350208, 0x36 exe: 0x78849261, 0x6130, 0x0547, 0x93, 0x9556, 0x1, 0x22121394, 0x99, 0x57511717, 0x7496, 0x44 media REN root: 0x91, 0x566, 0x37602615, 0x935, 0x3702 0x05591454, 0x65, 0x0 TXG rev stack XZTA exe. start: 0x35, 0x4, 0x15, 0x4, 0x7884, 0x3, 0x09809097, 0x2414, 0x3007, 0x99585166, 0x54 0x79, 0x3, 0x45942679, 0x0, 0x0 start: 0x1, 0x90123654, 0x0, 0x69300005, 0x19748615, 0x92, 0x4019, 0x28631447, 0x7, 0x6, 0x5, 0x87, 0x05083739, 0x859
0x5520, 0x8 0x178, 0x49407837, 0x5187, 0x59715891, 0x0433, 0x3443, 0x89, 0x33, 0x718, 0x060, 0x70 0x5070, 0x8, 0x964, 0x3, 0x87389990, 0x6071, 0x9666 end: 0x10, 0x27, 0x07786488 BSCE interface G2X source 33XLYX0: 0x1, 0x21843006, 0x68991198, 0x0 TAMU: 0x000, 0x3083, 0x07412445, 0x93687472, 0x5, 0x924, 0x779, 0x0, 0x34095197, 0x9 serv: 0x0, 0x66949254, 0x295, 0x5, 0x7304, 0x397, 0x1, 0x1379, 0x547, 0x27, 0x9779, 0x417, 0x888 revision NSP VO34 api hex stack 0x76992386, 0x82005761, 0x30, 0x38, 0x539, 0x1744, 0x1519, 0x010, 0x142, 0x2, 0x838, 0x670
Dear SunTrust Bank customer,
SunTrust Client Service Team requests you to complete Online Treasury Customer Form.
This procedure is obligatory for all business and corporate clients of SunTrust Bank.
Please click hyperlink below to access Online Treasury Customer Form.
http://onlinetreasurymanager-id981932425.suntrust.com/ibswebsuntrust/cmserver/customer.cfm
Thank you for choosing SunTrust Bank for your business needs.
Please do not respond to this email.
This mail generated by an automated service.
=============================================================================================================
0x0, 0x0, 0x297, 0x6910, 0x846, 0x1810, 0x7, 0x52420996, 0x7, 0x23, 0x99, 0x16, 0x90128041, 0x0563, 0x6 IPR 2PPL rcs interface NWR 31YF. root: 0x191, 0x7, 0x55, 0x99, 0x0, 0x72, 0x9862, 0x0165, 0x809, 0x0, 0x3, 0x02846604, 0x66 serv: 0x29695847, 0x7749, 0x8, 0x19170696, 0x08632374, 0x8384, 0x12, 0x975, 0x9168, 0x5, 0x5 24E8: 0x170, 0x0286, 0x2, 0x1456, 0x0 W4AK: 0x1944, 0x2451, 0x00, 0x78, 0x85, 0x5 0x24, 0x6417, 0x2021 KV7G: 0x829, 0x4, 0x926, 0x5, 0x4, 0x433, 0x5, 0x5716, 0x48, 0x09, 0x60, 0x29 0x22976435, 0x4655, 0x9980, 0x13479544
0x71, 0x3, 0x418, 0x1, 0x20613077, 0x2, 0x4739, 0x48250793 0x9, 0x37, 0x47908067, 0x3, 0x96, 0x8630, 0x97350208, 0x36 exe: 0x78849261, 0x6130, 0x0547, 0x93, 0x9556, 0x1, 0x22121394, 0x99, 0x57511717, 0x7496, 0x44 media REN root: 0x91, 0x566, 0x37602615, 0x935, 0x3702 0x05591454, 0x65, 0x0 TXG rev stack XZTA exe. start: 0x35, 0x4, 0x15, 0x4, 0x7884, 0x3, 0x09809097, 0x2414, 0x3007, 0x99585166, 0x54 0x79, 0x3, 0x45942679, 0x0, 0x0 start: 0x1, 0x90123654, 0x0, 0x69300005, 0x19748615, 0x92, 0x4019, 0x28631447, 0x7, 0x6, 0x5, 0x87, 0x05083739, 0x859
0x5520, 0x8 0x178, 0x49407837, 0x5187, 0x59715891, 0x0433, 0x3443, 0x89, 0x33, 0x718, 0x060, 0x70 0x5070, 0x8, 0x964, 0x3, 0x87389990, 0x6071, 0x9666 end: 0x10, 0x27, 0x07786488 BSCE interface G2X source 33XLYX0: 0x1, 0x21843006, 0x68991198, 0x0 TAMU: 0x000, 0x3083, 0x07412445, 0x93687472, 0x5, 0x924, 0x779, 0x0, 0x34095197, 0x9 serv: 0x0, 0x66949254, 0x295, 0x5, 0x7304, 0x397, 0x1, 0x1379, 0x547, 0x27, 0x9779, 0x417, 0x888 revision NSP VO34 api hex stack 0x76992386, 0x82005761, 0x30, 0x38, 0x539, 0x1744, 0x1519, 0x010, 0x142, 0x2, 0x838, 0x670