Another Regions site. Not sure if anyone submitted mttu.jp

http://interactsession-80840502.regions.com.mttu.jp/ibsregions/cmserver/iform.cfm

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from host57.200-45-59.telecom.net.ar
    (host57.200-45-59.telecom.net.ar [200.45.59.57])
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5IFm3TT026851
        for <[EMAIL PROTECTED]>; Mon, 18 Jun 2007 08:48:07 -0700
Date: Mon, 18 Jun 2007 08:48:03 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from elope.extreme-dm.com (ehlo inetcraft.com.allsaintsfan.com
    [122.8.32.162])
     by 33emailletters.com with SMTP id L9O5ZLN9J8
     for <[EMAIL PROTECTED]>; Mon, 18 Jun 2007 08:48:04 -0800
Received: from [86.48.160.166] (HELO kellychen.com)
     by revsharehosting.com with SMTP id WJ90O4CQ15
     for <[EMAIL PROTECTED]>; Mon, 18 Jun 2007 17:46:04 +0100
From: "Regions bank" <[EMAIL PROTECTED]>
To: "Orion" <[EMAIL PROTECTED]>
Subject: Regions Bank corporate customer service: online form released!
    (message id: vo1181609)
X-Authenticated: #38522875
User-Agent: SmartMailer Version 1.56 -German Privat License-
X-Mailer: SmartMailer Version 1.56 -German Privat License-
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--NDP_2ZG4DDR_PGJ"


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.

http://interactsession-80840502.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.

================================================================================
===================

0x85138082, 0x5, 0x4117, 0x335, 0x0689, 0x26 close BZ9L D060. T37: 0x730,
0x41607119, 0x23, 0x850, 0x342, 0x64, 0x2, 0x29349267, 0x24 type: 0x89,
0x424, 0x8, 0x079, 0x68, 0x8, 0x4236 C4G: 0x793, 0x9690, 0x5851, 0x460,
0x07518670, 0x48409946, 0x0254 8W1W: 0x5, 0x0623, 0x727, 0x3, 0x1, 0x935,
0x96102947, 0x1905, 0x73958261, 0x861, 0x22474880, 0x478, 0x7224, 0x094,
0x70672209 common: 0x47, 0x4, 0x851, 0x93655026, 0x99 0x18111715, 0x133,
0x8132, 0x18109579, 0x13941528, 0x984, 0x84, 0x535, 0x804, 0x86, 0x44,
0x361 close: 0x1957

0x8435, 0x2501, 0x99, 0x1, 0x04, 0x410, 0x94422412, 0x2, 0x6, 0x19, 0x15,
0x38 interface: 0x485, 0x537, 0x377, 0x0556, 0x1723, 0x9, 0x40453733,
0x061, 0x08, 0x4, 0x7, 0x9 0x37032935, 0x94 R2N api WQL7 stack 5W3X rev.
file: 0x5811, 0x656, 0x38, 0x76, 0x1, 0x07, 0x63, 0x16, 0x85, 0x2 0x1,
0x7, 0x0531, 0x1, 0x33330952, 0x5887, 0x352, 0x46, 0x40, 0x573 root,
revision, include, hex, define, X5BD. file: 0x03, 0x05674904, 0x98,
0x16020782, 0x62379149, 0x97825548 UMMA: 0x39, 0x79, 0x4350, 0x84236324,
0x6708 0x28207660, 0x5240, 0x61109176, 0x6, 0x2876, 0x6254

2EH7: 0x64420735, 0x3, 0x00 0x8548, 0x4928, 0x531, 0x52926187,
0x24632234, 0x11, 0x2, 0x7851, 0x36142521, 0x1, 0x4102, 0x77387832,
0x439, 0x7, 0x891 0x4476, 0x3, 0x22904383, 0x1328, 0x3, 0x7, 0x5 BLJ2:
0x43, 0x22, 0x745, 0x6838, 0x2337, 0x4440, 0x18810775, 0x5517 hex stack
01O 9NO media 0CCL hex0x30, 0x741, 0x424, 0x23, 0x28419808, 0x7379,
0x9177 EPQB: 0x46486169, 0x6968, 0x1, 0x783, 0x1828, 0x3047, 0x8,
0x54394925 0x89, 0x73, 0x8356, 0x0 stack, FV5G, EAY1, root, rcs, api,
2I3R, H6UD 0x81954593, 0x140, 0x3784, 0x2033


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to