Regions phishing site at:

http://interactsession-698931949.regions.com.techt.la/ibsregions/cmserver/iform.cfm

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 67.103.69.42 ([151.63.183.177])
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l59D9wOW025653
        for <[EMAIL PROTECTED]>; Sat, 9 Jun 2007 06:09:59 -0700
Date: Sat, 9 Jun 2007 06:09:58 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from qaix.com (helo lobiga.com.clickcashmoney.com [61.36.199.180])
  by mackone.freeserve.co.uk with SMTP id 6K7AFQAW76
  for <[EMAIL PROTECTED]>; Sat, 09 Jun 2007 09:09:55 -0500
Received: from punkass.com (unknown [78.164.6.223])
  by idealbandwidth.com with SMTP id 7FDQ4LTMJB
  for <[EMAIL PROTECTED]>; Sat, 09 Jun 2007 19:08:55 +0500
X-Originating-IP: 91.231.232.85
From: "Regions Bank" <[EMAIL PROTECTED]>
To: "Lithium" <[EMAIL PROTECTED]>
Subject: Regions Bank corporate customer service: alert - online client
    form released! (message id: x47942561937)
X-Originating-IP: 91.231.232.85
User-Agent: Internet Mail Service (5.5.2650.21)
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--CHA3HIDV08HI7W_2.K14"


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.

http://interactsession-698931949.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.

-----------------------------------------------------------------------

0x385, 0x32, 0x933, 0x5361, 0x03, 0x240, 0x22, 0x72, 0x03, 0x73 JKKK,
XA4, XAH1, hex, 7N7, exe, 1UV, file, 1V9 0x7912, 0x772, 0x904, 0x6390,
0x13029689, 0x04084759 0x4925, 0x532, 0x670, 0x63, 0x63483705, 0x9613,
0x77, 0x2218, 0x06, 0x9, 0x08216621 0x5122 0x68, 0x81, 0x5, 0x24886477,
0x57350224, 0x254, 0x66, 0x12582551, 0x30 0x31, 0x851, 0x188, 0x60,
0x958, 0x9315, 0x51, 0x2 0x7569, 0x392, 0x0047, 0x5, 0x021, 0x474 root:
0x7, 0x034, 0x47, 0x25115850, 0x5795, 0x1, 0x55324401, 0x6, 0x89753228,
0x9, 0x42646060, 0x47, 0x02902847, 0x4, 0x6610

include: 0x661, 0x46, 0x734, 0x4163, 0x43824815, 0x90 exe: 0x81491511,
0x26544404, 0x69, 0x5, 0x26810721, 0x72, 0x5533, 0x5 serv: 0x845, 0x3661,
0x42, 0x39, 0x433, 0x02, 0x43813807, 0x333, 0x5441, 0x99, 0x232 exe, hex
G6V, 9KUZ. 6IMB: 0x989 0x54489824, 0x02, 0x290, 0x08898800, 0x57, 0x16,
0x7181 type rev update 0x0, 0x869, 0x16236897, 0x5, 0x51533685, 0x816,
0x1, 0x7, 0x7218, 0x96, 0x766 hex: 0x5599, 0x73638621, 0x2461, 0x3318,
0x44646036, 0x87, 0x8648, 0x05, 0x82, 0x9, 0x8107, 0x2, 0x30555840,
0x9236 function: 0x924, 0x7, 0x7, 0x2, 0x6, 0x27188109, 0x0, 0x4062,
0x713, 0x7625, 0x7636, 0x151, 0x88, 0x4520, 0x71098216

exe: 0x01429271, 0x666, 0x5092, 0x2654, 0x2863, 0x3, 0x4, 0x099,
0x49898989, 0x1653, 0x5, 0x131, 0x83 0x3278, 0x45725378, 0x261, 0x0805,
0x49965030, 0x51503876, 0x06621113, 0x731, 0x2151, 0x406, 0x6812 0x1361,
0x8690, 0x1837, 0x26, 0x2, 0x37617371 stack: 0x11698170, 0x9067, 0x6272,
0x2756, 0x5337, 0x480, 0x56, 0x7, 0x2451 api cvs create XJX 1TO
VW2K.0x93, 0x2, 0x151, 0x91263602, 0x1415, 0x636, 0x15, 0x08, 0x1480,
0x459, 0x99639063, 0x41, 0x44, 0x36, 0x7434 0x77654467, 0x6, 0x8, 0x17,
0x051 stack: 0x92100665, 0x971, 0x96221334, 0x9042, 0x69, 0x78751050,
0x9, 0x04 cvs hex hex end root CDX dec cvs. 0x7, 0x38, 0x2, 0x03,
0x80088567, 0x6985, 0x323, 0x0116, 0x9977


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to