The Scamdex Scam Email Archive X

Subject:  PNC Bank reminder: please complete online form!
From:  "PNC Bank" <custservice.ref447188150283572.ib@pnc.com>
Date:  Sun, 10 Jun 2007 02:15:27 -0700
Category:  Employment/Job
Date Added:  2016-07-20 20:18:15

An Email with the Subject "PNC Bank reminder: please complete online form!" was received in one of Scamdex's honeypot email accounts on Sun, 10 Jun 2007 02:15:27 -0700 and has been classified as a Employment/Job Scam Email. The sender shows as "PNC Bank" <custservice.ref447188150283572.ib@pnc.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear PNC Bank corporate/business online client:

The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.

This procedure is obligatory for all business and corporate clients of PNC Bank.

Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.

http://treasury-session2592650.pnc.com/esec/customercare/form.jsp

Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.

Please do not respond to this email.

This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.

---------------------------------------------------------------------------------------------------

DQN3: 0x95, 0x48, 0x382, 0x1, 0x04222816, 0x3, 0x7481, 0x8959, 0x7595, 0x15, 0x021, 0x801, 0x55 FKL3 1GT DSSD interface close: 0x9810, 0x67, 0x39233845, 0x8, 0x85401003, 0x00, 0x269, 0x9639, 0x75, 0x336, 0x85855311, 0x71667031, 0x1, 0x752, 0x618 0x7122, 0x3478 0x5, 0x2202 rev: 0x26049369, 0x406 0x89272284, 0x2, 0x1, 0x3, 0x1019, 0x9, 0x964, 0x623 end: 0x640, 0x000, 0x2299, 0x03, 0x768, 0x2, 0x442, 0x4950, 0x79698535, 0x9, 0x2, 0x799, 0x07762206, 0x2307 0x6, 0x5583

0x57, 0x2705, 0x17486862, 0x3710, 0x7970 0x7, 0x5, 0x0, 0x80, 0x94088930, 0x31756924, 0x14011956 9T5F: 0x33, 0x5156, 0x6249, 0x0, 0x01, 0x82, 0x7, 0x25, 0x31624707, 0x62552141, 0x1029, 0x0888, 0x440, 0x423 revision, CAJ 0x580, 0x178, 0x9, 0x3783, 0x2, 0x4, 0x435, 0x0741, 0x653, 0x59, 0x91 PZDT: 0x304, 0x58650223, 0x76, 0x3497, 0x2, 0x07, 0x045, 0x891, 0x582, 0x41 ENF. close: 0x88, 0x51, 0x3, 0x15 0x0, 0x67512578, 0x6571, 0x4946, 0x6411 tmp: 0x9007, 0x545, 0x1, 0x1139, 0x275, 0x87843755, 0x13, 0x25424222, 0x5

0x97, 0x8, 0x11940599, 0x08067247, 0x74, 0x6405, 0x2, 0x44 0x683, 0x46190332, 0x08456084, 0x90983326, 0x350, 0x0, 0x56, 0x8, 0x94, 0x2 H9V3: 0x76936082, 0x3154, 0x2, 0x1456, 0x81, 0x782, 0x61552835, 0x3286, 0x50748067, 0x981, 0x7743, 0x13232395 0x39532287, 0x2290, 0x108, 0x13231561, 0x5, 0x60, 0x1583, 0x1, 0x567, 0x0, 0x5, 0x54571004, 0x6, 0x86823024 root api revision 84PX source 7NG tmp 5ST WN86YW4: 0x4, 0x61 0x989, 0x48077534, 0x1816, 0x72704271, 0x020, 0x57, 0x38, 0x10, 0x555, 0x37059862, 0x1195, 0x634, 0x93, 0x9 REI0: 0x83, 0x2, 0x065, 0x1, 0x719, 0x8, 0x2, 0x6972, 0x4 A4G4 9SH 7314 WUH common. 0x2, 0x0199, 0x21832826, 0x962, 0x5, 0x43, 0x17, 0x18356259, 0x9, 0x5, 0x56408352, 0x7, 0x10848503, 0x244, 0x7


Dear PNC Bank corporate/business online client:

The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.

This procedure is obligatory for all business and corporate clients of PNC Bank.

Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.

http://treasury-session2592650.pnc.com/esec/customercare/form.jsp

Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.

Please do not respond to this email.

This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.

---------------------------------------------------------------------------------------------------

DQN3: 0x95, 0x48, 0x382, 0x1, 0x04222816, 0x3, 0x7481, 0x8959, 0x7595, 0x15, 0x021, 0x801, 0x55 FKL3 1GT DSSD interface close: 0x9810, 0x67, 0x39233845, 0x8, 0x85401003, 0x00, 0x269, 0x9639, 0x75, 0x336, 0x85855311, 0x71667031, 0x1, 0x752, 0x618 0x7122, 0x3478 0x5, 0x2202 rev: 0x26049369, 0x406 0x89272284, 0x2, 0x1, 0x3, 0x1019, 0x9, 0x964, 0x623 end: 0x640, 0x000, 0x2299, 0x03, 0x768, 0x2, 0x442, 0x4950, 0x79698535, 0x9, 0x2, 0x799, 0x07762206, 0x2307 0x6, 0x5583

0x57, 0x2705, 0x17486862, 0x3710, 0x7970 0x7, 0x5, 0x0, 0x80, 0x94088930, 0x31756924, 0x14011956 9T5F: 0x33, 0x5156, 0x6249, 0x0, 0x01, 0x82, 0x7, 0x25, 0x31624707, 0x62552141, 0x1029, 0x0888, 0x440, 0x423 revision, CAJ 0x580, 0x178, 0x9, 0x3783, 0x2, 0x4, 0x435, 0x0741, 0x653, 0x59, 0x91 PZDT: 0x304, 0x58650223, 0x76, 0x3497, 0x2, 0x07, 0x045, 0x891, 0x582, 0x41 ENF. close: 0x88, 0x51, 0x3, 0x15 0x0, 0x67512578, 0x6571, 0x4946, 0x6411 tmp: 0x9007, 0x545, 0x1, 0x1139, 0x275, 0x87843755, 0x13, 0x25424222, 0x5

0x97, 0x8, 0x11940599, 0x08067247, 0x74, 0x6405, 0x2, 0x44 0x683, 0x46190332, 0x08456084, 0x90983326, 0x350, 0x0, 0x56, 0x8, 0x94, 0x2 H9V3: 0x76936082, 0x3154, 0x2, 0x1456, 0x81, 0x782, 0x61552835, 0x3286, 0x50748067, 0x981, 0x7743, 0x13232395 0x39532287, 0x2290, 0x108, 0x13231561, 0x5, 0x60, 0x1583, 0x1, 0x567, 0x0, 0x5, 0x54571004, 0x6, 0x86823024 root api revision 84PX source 7NG tmp 5ST WN86YW4: 0x4, 0x61 0x989, 0x48077534, 0x1816, 0x72704271, 0x020, 0x57, 0x38, 0x10, 0x555, 0x37059862, 0x1195, 0x634, 0x93, 0x9 REI0: 0x83, 0x2, 0x065, 0x1, 0x719, 0x8, 0x2, 0x6972, 0x4 A4G4 9SH 7314 WUH common. 0x2, 0x0199, 0x21832826, 0x962, 0x5, 0x43, 0x17, 0x18356259, 0x9, 0x5, 0x56408352, 0x7, 0x10848503, 0x244, 0x7