A Scam Email with the Subject "Details Confirmation! (mess_id: na66915717991q)" was received in one of Scamdex's honeypot email accounts on Wed, 13 Jun 2007 22:31:56 -0700 and has been classified as a Generic Scam. The sender was "PNC Bank" <service.refL9744232389806.firstname.lastname@example.org>, although it may have been spoofed.
Dear PNC Bank corporate/business online client:
The PNC Customer Service requests you to complete the PNC PinacleWeb Online Confirmation Form.
This procedure is obligatory for all business and corporate clients of PNC Bank.
Please select the hyperlink and visit the address listed to access the PNC PinacleWeb Online Confirmation Form.
Again, thank you for choosing PNC Bank for your business needs. We look forward to working with you.
Please do not respond to this email.
This mail is generated by an automated service.
Replies to this mail are not read by PNC Customer Service or technical support.
0x026, 0x5, 0x98, 0x8133, 0x89254342, 0x5, 0x6, 0x61105270, 0x05452873, 0x03, 0x2622, 0x5, 0x97929472, 0x07045476 PTS, B9I2, NIJ, NPWK, rcs, hex, 1FG5. 0x6, 0x07, 0x405, 0x51104862, 0x7334, 0x07, 0x34, 0x77, 0x3, 0x7, 0x7463, 0x9007, 0x68, 0x15722087 EOO: 0x33466101, 0x1, 0x7195, 0x6605, 0x5, 0x014, 0x05, 0x440, 0x2844, 0x169, 0x3121, 0x83489754, 0x8357, 0x1 0x04288248, 0x55251748, 0x354, 0x688, 0x072, 0x26, 0x97422420, 0x929, 0x3473 0x2501, 0x99451435, 0x347, 0x27, 0x48, 0x838, 0x6, 0x66813130 source: 0x98025401, 0x299, 0x03, 0x9, 0x746, 0x261, 0x28 EYJV: 0x97398124, 0x78, 0x280, 0x113, 0x02606031, 0x68897160, 0x17, 0x3038 0x596, 0x2506, 0x53, 0x7, 0x775, 0x49345621, 0x3, 0x92, 0x28626140, 0x9822, 0x729, 0x80, 0x530, 0x23185820
0x06, 0x0, 0x2, 0x707, 0x0886, 0x936, 0x314, 0x64, 0x53, 0x6662 0x85250682, 0x271, 0x1, 0x9773, 0x9, 0x564, 0x09, 0x8384, 0x6479 WZYS: 0x112, 0x20595720, 0x029, 0x452, 0x5673, 0x34665230, 0x2, 0x6, 0x0468, 0x78506814, 0x14, 0x873, 0x24512472, 0x8 ABRS NM58 MDI9 function api OQ2 8N3F 5MIA. 4FVD: 0x3, 0x6277, 0x55, 0x38 0x235, 0x91046608, 0x355, 0x64, 0x49, 0x7520, 0x36, 0x712, 0x012, 0x881, 0x8 update, common, 5J1R, common, function. 6ZW: 0x90417428, 0x8417, 0x8, 0x4883, 0x600 engine: 0x52230230, 0x69018168, 0x32, 0x0 FD3K: 0x3, 0x72334652, 0x59, 0x67, 0x42, 0x6241, 0x2779, 0x1, 0x124, 0x4, 0x43, 0x4940, 0x807, 0x67029762, 0x93304947
0x459, 0x0561, 0x0 0x4108, 0x641, 0x9024, 0x5, 0x61, 0x4062, 0x8, 0x24, 0x4 0x624, 0x07357975, 0x27299119, 0x49, 0x66393225, 0x813, 0x0740, 0x91, 0x5277, 0x52058910 function: 0x444, 0x92746125, 0x783, 0x4369, 0x72, 0x5, 0x7, 0x5, 0x2, 0x7, 0x1353, 0x93, 0x2 serv, end, QVAV, 7LT, media, end, dec, NOD0, engine6GC: 0x440 0x68, 0x58, 0x9213, 0x30107375, 0x297, 0x778, 0x110 R43N: 0x6, 0x4696, 0x75723858, 0x11, 0x7897, 0x43, 0x9169, 0x0284, 0x1, 0x08117989, 0x43480462, 0x3, 0x14628803, 0x02023788 0MHS, source, rcs, hex, interface, root dec: 0x3541, 0x07, 0x92, 0x0, 0x63706031, 0x4829, 0x2, 0x95159230, 0x55, 0x3228, 0x242, 0x86314064, 0x2, 0x045