An Email with the Subject "PNC Bank: online form released!" was received in one of Scamdex's honeypot email accounts on Thu, 14 Jun 2007 03:35:35 -0700 and has been classified as a Employment/Job Scam Email. The sender shows as "PNC Bank" <cservice.ref63160071039.ib@pnc.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear PNC Bank corporate/business online client:
The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of PNC Bank.
Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.
http://treasury-session3422675082.pnc.com/esec/customercare/form.jsp
Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.
Please do not respond to this email.
This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.
========================================================================
0x51524869, 0x99, 0x97210800, 0x2133, 0x08819398, 0x8 YDHO type JXTM stack OOQ3 function KTQ LF5M type. 0x64145066, 0x376, 0x70448161, 0x18, 0x9, 0x307 0x804, 0x67907566, 0x13 rcs: 0x836 W6UN: 0x2, 0x743, 0x6676, 0x543, 0x9, 0x0, 0x3091, 0x430, 0x1230, 0x1061 function: 0x149, 0x463, 0x6, 0x95559854, 0x20247997, 0x875, 0x5633, 0x3, 0x528, 0x1734, 0x1, 0x32925280 0x66727571, 0x133, 0x5477, 0x981, 0x40, 0x74890303, 0x62565104, 0x31996246, 0x77 common: 0x477, 0x0, 0x50190991, 0x686, 0x6016, 0x34901701, 0x12584446, 0x59161818
XAK: 0x61850057, 0x1570, 0x54 AEL: 0x2, 0x66, 0x96712179, 0x809, 0x62, 0x3, 0x6, 0x6, 0x95 002: 0x722, 0x50128206, 0x2, 0x81, 0x27626429, 0x6360 start exe common update revision start: 0x53703728, 0x5519, 0x15717144, 0x2142, 0x8 M6I: 0x6731, 0x17639837, 0x46, 0x33, 0x414, 0x6764, 0x9 EE1C VN1X DA8. 0x3985, 0x81, 0x561, 0x4, 0x2537, 0x19434411, 0x5, 0x63, 0x823 revision: 0x0, 0x77, 0x651, 0x51, 0x7, 0x4768, 0x24480952 cvs: 0x14, 0x9250, 0x69, 0x8, 0x38, 0x29826667
0x04, 0x9, 0x24 0x276, 0x796, 0x672 0x3661, 0x91357371, 0x030, 0x70473792, 0x2036 0x60, 0x21, 0x92, 0x72077946, 0x4048, 0x728, 0x27 5WMK, engine interface, source0x59079600, 0x800, 0x503, 0x77894699, 0x75910622, 0x10319134, 0x58, 0x7752, 0x1180 0x18, 0x746, 0x868, 0x0, 0x9337, 0x7862, 0x4, 0x29, 0x7, 0x1, 0x23109185 0x0546, 0x012, 0x98, 0x301, 0x0042, 0x00301424, 0x60, 0x5, 0x709, 0x997, 0x4872 X9X function 2UH end engine. stack: 0x68, 0x1, 0x59636971, 0x34, 0x374, 0x8429
Dear PNC Bank corporate/business online client:
The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of PNC Bank.
Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.
http://treasury-session3422675082.pnc.com/esec/customercare/form.jsp
Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.
Please do not respond to this email.
This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.
========================================================================
0x51524869, 0x99, 0x97210800, 0x2133, 0x08819398, 0x8 YDHO type JXTM stack OOQ3 function KTQ LF5M type. 0x64145066, 0x376, 0x70448161, 0x18, 0x9, 0x307 0x804, 0x67907566, 0x13 rcs: 0x836 W6UN: 0x2, 0x743, 0x6676, 0x543, 0x9, 0x0, 0x3091, 0x430, 0x1230, 0x1061 function: 0x149, 0x463, 0x6, 0x95559854, 0x20247997, 0x875, 0x5633, 0x3, 0x528, 0x1734, 0x1, 0x32925280 0x66727571, 0x133, 0x5477, 0x981, 0x40, 0x74890303, 0x62565104, 0x31996246, 0x77 common: 0x477, 0x0, 0x50190991, 0x686, 0x6016, 0x34901701, 0x12584446, 0x59161818
XAK: 0x61850057, 0x1570, 0x54 AEL: 0x2, 0x66, 0x96712179, 0x809, 0x62, 0x3, 0x6, 0x6, 0x95 002: 0x722, 0x50128206, 0x2, 0x81, 0x27626429, 0x6360 start exe common update revision start: 0x53703728, 0x5519, 0x15717144, 0x2142, 0x8 M6I: 0x6731, 0x17639837, 0x46, 0x33, 0x414, 0x6764, 0x9 EE1C VN1X DA8. 0x3985, 0x81, 0x561, 0x4, 0x2537, 0x19434411, 0x5, 0x63, 0x823 revision: 0x0, 0x77, 0x651, 0x51, 0x7, 0x4768, 0x24480952 cvs: 0x14, 0x9250, 0x69, 0x8, 0x38, 0x29826667
0x04, 0x9, 0x24 0x276, 0x796, 0x672 0x3661, 0x91357371, 0x030, 0x70473792, 0x2036 0x60, 0x21, 0x92, 0x72077946, 0x4048, 0x728, 0x27 5WMK, engine interface, source0x59079600, 0x800, 0x503, 0x77894699, 0x75910622, 0x10319134, 0x58, 0x7752, 0x1180 0x18, 0x746, 0x868, 0x0, 0x9337, 0x7862, 0x4, 0x29, 0x7, 0x1, 0x23109185 0x0546, 0x012, 0x98, 0x301, 0x0042, 0x00301424, 0x60, 0x5, 0x709, 0x997, 0x4872 X9X function 2UH end engine. stack: 0x68, 0x1, 0x59636971, 0x34, 0x374, 0x8429