http://interactsession-00230.regions.com.rlrtid.hk/ibsregions/cmserver/i
form.cfm/
 
Incase url didn't come through for last one it was:
http://interactsession-22107847.regions.com.hkrkf.hk/ibsregions/cmserver
/iform.cfm/

________________________________

From: Regions Bank
[mailto:[EMAIL PROTECTED] 
Sent: Friday, 22 June 2007 4:24 AM
To: Mark Hora
Subject: *****SPAM***** Regions Bank corporate customer service:
important message!



Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.


http://interactsession-00230.regions.com/ibsregions/cmserver/iform.cfm
<http://interactsession-00230.regions.com.rlrtid.hk/ibsregions/cmserver/
iform.cfm> 

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.


------------------------------------------------------------------------
--

0x25, 0x71, 0x0277, 0x479, 0x97084793, 0x8, 0x4317 P7N7, type, source,
G6Z, TU7F, PYUM, rcs, common. 0x60157870, 0x8, 0x299, 0x440, 0x79557358,
0x84, 0x3 rev: 0x67 W2N: 0x32, 0x7104, 0x93, 0x6861, 0x53, 0x83, 0x521,
0x9709, 0x58, 0x744, 0x0, 0x321, 0x71, 0x1630, 0x47 0x2, 0x23557674,
0x9805, 0x10974084, 0x9498, 0x59648978, 0x98, 0x57370435, 0x80,
0x99520299, 0x0861, 0x2, 0x23830178, 0x32876648 0x60, 0x44301279,
0x9689, 0x227, 0x6104, 0x63765528, 0x4828, 0x20302892, 0x5752, 0x95,
0x90, 0x597, 0x66837776, 0x14, 0x5 0x7, 0x1347, 0x6782, 0x42963386,
0x3500, 0x8, 0x63652990, 0x844, 0x339, 0x161, 0x359, 0x6, 0x95,
0x60554923, 0x6 0x01668173, 0x483, 0x61, 0x928, 0x41102053, 0x49,
0x0831, 0x189, 0x1, 0x61, 0x204, 0x4, 0x19435504

0x0, 0x35749123, 0x032, 0x2 0x0, 0x96798626, 0x7724, 0x238, 0x9, 0x2819,
0x6925, 0x04, 0x22 NM3L: 0x2 92O, engine, B 62, hex, api, cvs, MMSA,
9QG. 0x0, 0x838, 0x34, 0x95, 0x106, 0x713, 0x653 0x96 1R6 XSE1 tmp
create B10B. 0x07959311, 0x57857082, 0x374, 0x4607, 0x4010, 0x135,
0x4102, 0x077, 0x64453620 0x867, 0x113, 0x3637, 0x1, 0x881, 0x7, 0x3,
0x537, 0x4, 0x4, 0x03282330, 0x83709386, 0x0, 0x02989215, 0x42 RIC: 0x3,
0x79, 0x18902787, 0x8639, 0x4, 0x2253, 0x203, 0x5, 0x3373, 0x4, 0x964,
0x6

0x0013, 0x51, 0x80030071, 0x41, 0x5, 0x02, 0x76, 0x7267, 0x824,
0x63119852, 0x8, 0x32, 0x46 0x43008331, 0x0, 0x0, 0x0 0x3766, 0x5450,
0x55106985, 0x82419159, 0x610, 0x7586, 0x31, 0x5918, 0x01, 0x9955
define: 0x12, 0x5 4H5F, hex, DQDV, ZYR6, CEQ8.4BE: 0x94444817, 0x84,
0x2884, 0x4474, 0x710, 0x57, 0x977, 0x5, 0x3, 0x61, 0x2427, 0x46343358,
0x68623780, 0x26 rcs: 0x0, 0x4548, 0x1, 0x41, 0x6 engine: 0x02030701,
0x30574511, 0x1 19Y6, BMBM, define. dec: 0x49275084, 0x09, 0x0519,
0x107, 0x2384, 0x91, 0x6, 0x6987, 0x8, 0x72648813, 0x04409174, 0x1649,
0x17543613

_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to