The Scamdex Scam Email Archive - Generic o

Subject:  Important message! (mess_id: K673693165N)
From:  "SunTrust Bank" <>
Date:  Sat, 14 Jul 2007 18:12:45 -0700

A Scam Email with the Subject "Important message! (mess_id: K673693165N)" was received in one of Scamdex's honeypot email accounts on Sat, 14 Jul 2007 18:12:45 -0700 and has been classified as a Generic Scam. The sender was "SunTrust Bank" <>, although it may have been spoofed.

Dear SunTrust Bank customer,

SunTrust Client Service Team requests you to complete Online Treasury Customer Form.

This procedure is obligatory for all business and corporate clients of SunTrust Bank.

Please click hyperlink below to access Online Treasury Customer Form.

Thank you for choosing SunTrust Bank for your business needs.

Please do not respond to this email.

This mail generated by an automated service.


0x3800, 0x3, 0x74852805, 0x0434, 0x93, 0x56627613, 0x96 795 function define. 0x62610737, 0x368, 0x6, 0x433, 0x67, 0x4 0x95213361, 0x0361, 0x50, 0x5, 0x8, 0x392, 0x35, 0x27205139, 0x1 hex: 0x47268887, 0x18 0x1326, 0x37353746, 0x00, 0x41, 0x78530510, 0x487, 0x0, 0x69701867, 0x65916258, 0x72856306, 0x0148, 0x0, 0x3 0x38574268, 0x468, 0x04, 0x8294, 0x5335, 0x1242, 0x360, 0x8201, 0x0694 13XL: 0x4130, 0x05891018, 0x3103, 0x19 api: 0x463, 0x908, 0x74334287, 0x60, 0x0, 0x7949, 0x18658995, 0x50, 0x942, 0x445, 0x435, 0x1314, 0x264, 0x9

LP8: 0x46, 0x686, 0x41942456, 0x1 close: 0x2, 0x47, 0x852, 0x1156, 0x6, 0x70195343 0x86, 0x1658, 0x74, 0x8, 0x78, 0x4, 0x56309724, 0x9255, 0x46, 0x81, 0x79912089, 0x60031689, 0x92, 0x43404345, 0x03 tmp, interface file, NY0C. common: 0x6060, 0x57, 0x9432, 0x53, 0x5698, 0x9, 0x146, 0x712, 0x6 2K8: 0x70162688, 0x56, 0x7 OIH. 0x7171, 0x591, 0x26, 0x4, 0x8, 0x20112654, 0x701, 0x8, 0x4, 0x3455, 0x70, 0x37682469, 0x24871194, 0x74453155, 0x7208 M500: 0x0882, 0x55331236, 0x1297, 0x404, 0x5752, 0x0, 0x48530039, 0x82789518, 0x33913253, 0x444 DE9: 0x5474, 0x95888585, 0x92, 0x22, 0x9, 0x6, 0x520, 0x133

serv: 0x61333950, 0x70, 0x35, 0x8, 0x4, 0x20, 0x00, 0x773, 0x3, 0x647, 0x856, 0x562, 0x035, 0x97478490, 0x96 H6D: 0x74123383, 0x07, 0x9137 source: 0x19, 0x16928560, 0x067, 0x88, 0x20077795, 0x9813, 0x7, 0x0, 0x9, 0x326, 0x7476, 0x0 0x34, 0x6537, 0x5647, 0x87979908, 0x5, 0x13, 0x3287, 0x549 function, function exe, startACH: 0x7097, 0x66, 0x517 root: 0x13231592, 0x4, 0x38, 0x6, 0x49, 0x090, 0x2, 0x98700592, 0x9733, 0x92, 0x41, 0x24, 0x8515, 0x39 P3SZ: 0x0032, 0x2, 0x8370, 0x2, 0x4003, 0x2432, 0x7, 0x49359135, 0x886, 0x34, 0x26447818, 0x17083494, 0x146 engine B76S tmp stack dec KTT7 3Q4 69F end 0x73615870