Wow, first one in like 4 days... Regions at:

http://interactsession-70020.regions.com.usersetup.io/ibsregions/cmserver/iform.cfm

Might be a hacked server.
User ID :        NIC-89047
Contact Name :  emira fako
E-Mail :         [EMAIL PROTECTED]
Nameserver :     NS1.VIDEO-RTV.COM
Nameserver :     NS2.VIDEO-RTV.COM

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 107.165.195-77.rev.gaoland.net
    (107.165.195-77.rev.gaoland.net [77.195.165.107] (may be forged))
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5FEYokK012850
        for <[EMAIL PROTECTED]>; Fri, 15 Jun 2007 07:34:52 -0700
Date: Fri, 15 Jun 2007 07:34:50 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from [49.96.86.146] (HELO mail.com)
    by quizilla.com with SMTP id UBDH9497IY
    for <[EMAIL PROTECTED]>; Fri, 15 Jun 2007 07:34:45 -0800
From: "Regions Bank" <[EMAIL PROTECTED]>
To: "Thomastapeworm" <[EMAIL PROTECTED]>
Subject: Regions Bank corporate customer service: official information!
    (mess_id: M958061597IF)
Organization: Regions bank [EMAIL PROTECTED]
User-Agent: Pegasus Mail for Win32 (v2.53/R1)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--TJLOC6QA80CDE9VOBA"


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.

http://interactsession-70020.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.

________________________________________________________________________________
___

UFP: 0x6607, 0x6, 0x730, 0x6207, 0x02564117, 0x89969604, 0x45101693,
0x828, 0x5, 0x399, 0x990 75HH engine exe tmp revision end 4RM api 0x859,
0x41, 0x97, 0x88220928, 0x429, 0x5 0x09209761 XRHX: 0x3914, 0x0, 0x802,
0x95 CQZ: 0x4, 0x3637, 0x1906, 0x851, 0x4842, 0x6, 0x03, 0x73, 0x413,
0x7037, 0x82302570 common: 0x01, 0x2, 0x54, 0x8, 0x9, 0x7592 create:
0x40, 0x69287430, 0x1, 0x3, 0x5567, 0x35384178, 0x7, 0x86, 0x00 0x4598,
0x987, 0x7343, 0x2, 0x36147812, 0x10, 0x6

0x2, 0x0, 0x9062, 0x62692699, 0x17, 0x741, 0x2, 0x69251648, 0x79122424,
0x11, 0x222, 0x76, 0x540, 0x1 type: 0x20, 0x3, 0x1, 0x665, 0x9, 0x219,
0x06067182, 0x45741503, 0x5178, 0x8, 0x95 stack: 0x97578190, 0x63647390,
0x33637670, 0x97406504, 0x0230, 0x96650795, 0x2076, 0x94915013, 0x1,
0x09255241, 0x3, 0x8586, 0x29, 0x9 I6D AAE start engine JK9 I5U1 stack
0x18, 0x91530682, 0x70, 0x1, 0x35, 0x24987251, 0x6, 0x8555, 0x28, 0x621,
0x2 hex: 0x3, 0x58555023, 0x19707823, 0x768, 0x3454, 0x31, 0x118, 0x9,
0x99532153, 0x71632709, 0x2, 0x9796, 0x2 hex serv update 0x82079698,
0x45, 0x47666728, 0x40, 0x1641, 0x5 0x396, 0x0873, 0x306, 0x5226, 0x378,
0x82758702, 0x0326, 0x58, 0x79561266, 0x275, 0x29 R8X: 0x68, 0x06612205,
0x773, 0x3664, 0x0, 0x7, 0x24823711, 0x2897, 0x73, 0x101

0x9, 0x400, 0x1126, 0x2137, 0x23189087, 0x13, 0x53, 0x7878, 0x37, 0x04,
0x81249135, 0x4640, 0x8034 0x07, 0x0, 0x99, 0x1 0x9, 0x7271, 0x596,
0x334, 0x03, 0x2, 0x3, 0x4293, 0x05, 0x9 0x13033724, 0x9717, 0x888,
0x23393490 update X5B define W5T.0x9, 0x08, 0x1994, 0x890, 0x35207453,
0x31536878, 0x6, 0x025, 0x90836519, 0x7520, 0x43376875, 0x0749, 0x6525,
0x4, 0x499 TJRR: 0x186, 0x40886383, 0x52 file: 0x56832579, 0x413, 0x326,
0x5, 0x60591693, 0x3, 0x771, 0x27, 0x05, 0x7, 0x51728801, 0x1, 0x76 W7A1.
S90: 0x40711948


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to