http://interactsession-00230.regions.com.rlrtid.hk/ibsregions/cmserver/i form.cfm/ Incase url didn't come through for last one it was: http://interactsession-22107847.regions.com.hkrkf.hk/ibsregions/cmserver /iform.cfm/
________________________________ From: Regions Bank [mailto:[EMAIL PROTECTED] Sent: Friday, 22 June 2007 4:24 AM To: Mark Hora Subject: *****SPAM***** Regions Bank corporate customer service: important message! Dear business client of Regions Bank: The Regions Customer Service requests you to complete the Regions InterAct Confirmation Form. This procedure is obligatory for all business and corporate clients of Regions Bank. Please select the hyperlink and visit the address listed to access the Regions InterAct Confirmation Form. http://interactsession-00230.regions.com/ibsregions/cmserver/iform.cfm <http://interactsession-00230.regions.com.rlrtid.hk/ibsregions/cmserver/ iform.cfm> Again, thank you for choosing Regions Bank for your business needs. We look forward to working with you. ***** Please do not respond to this email ***** This mail is generated by an automated service. Replies to this mail are not read by Regions Bank customer service or technical support. ------------------------------------------------------------------------ -- 0x25, 0x71, 0x0277, 0x479, 0x97084793, 0x8, 0x4317 P7N7, type, source, G6Z, TU7F, PYUM, rcs, common. 0x60157870, 0x8, 0x299, 0x440, 0x79557358, 0x84, 0x3 rev: 0x67 W2N: 0x32, 0x7104, 0x93, 0x6861, 0x53, 0x83, 0x521, 0x9709, 0x58, 0x744, 0x0, 0x321, 0x71, 0x1630, 0x47 0x2, 0x23557674, 0x9805, 0x10974084, 0x9498, 0x59648978, 0x98, 0x57370435, 0x80, 0x99520299, 0x0861, 0x2, 0x23830178, 0x32876648 0x60, 0x44301279, 0x9689, 0x227, 0x6104, 0x63765528, 0x4828, 0x20302892, 0x5752, 0x95, 0x90, 0x597, 0x66837776, 0x14, 0x5 0x7, 0x1347, 0x6782, 0x42963386, 0x3500, 0x8, 0x63652990, 0x844, 0x339, 0x161, 0x359, 0x6, 0x95, 0x60554923, 0x6 0x01668173, 0x483, 0x61, 0x928, 0x41102053, 0x49, 0x0831, 0x189, 0x1, 0x61, 0x204, 0x4, 0x19435504 0x0, 0x35749123, 0x032, 0x2 0x0, 0x96798626, 0x7724, 0x238, 0x9, 0x2819, 0x6925, 0x04, 0x22 NM3L: 0x2 92O, engine, B 62, hex, api, cvs, MMSA, 9QG. 0x0, 0x838, 0x34, 0x95, 0x106, 0x713, 0x653 0x96 1R6 XSE1 tmp create B10B. 0x07959311, 0x57857082, 0x374, 0x4607, 0x4010, 0x135, 0x4102, 0x077, 0x64453620 0x867, 0x113, 0x3637, 0x1, 0x881, 0x7, 0x3, 0x537, 0x4, 0x4, 0x03282330, 0x83709386, 0x0, 0x02989215, 0x42 RIC: 0x3, 0x79, 0x18902787, 0x8639, 0x4, 0x2253, 0x203, 0x5, 0x3373, 0x4, 0x964, 0x6 0x0013, 0x51, 0x80030071, 0x41, 0x5, 0x02, 0x76, 0x7267, 0x824, 0x63119852, 0x8, 0x32, 0x46 0x43008331, 0x0, 0x0, 0x0 0x3766, 0x5450, 0x55106985, 0x82419159, 0x610, 0x7586, 0x31, 0x5918, 0x01, 0x9955 define: 0x12, 0x5 4H5F, hex, DQDV, ZYR6, CEQ8.4BE: 0x94444817, 0x84, 0x2884, 0x4474, 0x710, 0x57, 0x977, 0x5, 0x3, 0x61, 0x2427, 0x46343358, 0x68623780, 0x26 rcs: 0x0, 0x4548, 0x1, 0x41, 0x6 engine: 0x02030701, 0x30574511, 0x1 19Y6, BMBM, define. dec: 0x49275084, 0x09, 0x0519, 0x107, 0x2384, 0x91, 0x6, 0x6987, 0x8, 0x72648813, 0x04409174, 0x1649, 0x17543613
_______________________________________________ phishing mailing list [email protected] http://www.whitestar.linuxbox.org/mailman/listinfo/phishing
