Regions at:
http://interactsession-4482453.regions.com.loge3.hk/ibsregions/cmserver/iform.cfm
--
Steve
---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 200191166225-dial-user-ecp.acessonet.com.br
(200191166225-dial-user-ECP.acessonet.com.br [200.191.166.225])
by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5O0EiEt029030
for <[EMAIL PROTECTED]>; Sat, 23 Jun 2007 17:15:08 -0700
Date: Sat, 23 Jun 2007 17:14:44 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from azebar.com (ehlo host-telecom.com.myramstore.com
[73.74.176.53])
by search.com with SMTP id VSXMYT6I80
for <[EMAIL PROTECTED]>; Fri, 22 Jun 2007 01:57:48 -0500
Received: from chocofan.com (chocofan.com.nameself.com [78.112.187.168])
by omnis.com with SMTP id 2AA6JN20N5
for <[EMAIL PROTECTED]>; Fri, 22 Jun 2007 12:53:48 +0600
From: "Regions bank" <[EMAIL PROTECTED]>
To: "Myrna.chang" <[EMAIL PROTECTED]>
X-Authentication-Warning: K75-verify9.SBD42k.millie.omnis.com
(borealis.bradfitz.com [93.166.240.67]): a503louvre set sender to
[EMAIL PROTECTED] using -z
Subject: Official Information! (message id: m71010159k)
User-Agent: SmartMailer Version 1.56 -German Privat License-
X-Mailer: SmartMailer Version 1.56 -German Privat License-
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--XD_5Q5YXD_FISZOFJMH3HE"
Dear business client of Regions Bank:
The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.
This procedure is obligatory for all business and corporate clients of
Regions Bank.
Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.
http://interactsession-4482453.regions.com/ibsregions/cmserver/iform.cfm
Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.
.
0x7738, 0x1834, 0x85, 0x43, 0x5645, 0x1, 0x30 DWVZ WSC 4QU5 tmp
0x21394273 MD64: 0x33591798, 0x39, 0x202, 0x75634247, 0x8, 0x411, 0x4
0x84, 0x84502557, 0x2, 0x642, 0x030, 0x7358, 0x2644 source: 0x819,
0x48623566, 0x71, 0x0, 0x10474413, 0x2326, 0x726, 0x116, 0x170, 0x057
0x65472486, 0x2193, 0x2, 0x49469496 0x4, 0x371, 0x2, 0x64, 0x5662, 0x278,
0x347, 0x601, 0x85740101, 0x71, 0x8463, 0x89533517, 0x00017853 AJF3:
0x67889361, 0x1346, 0x73, 0x32359882, 0x92646019, 0x105, 0x3379, 0x08
0x52, 0x38410412, 0x64, 0x0, 0x0267, 0x205, 0x165, 0x19042683, 0x7636,
0x02, 0x50582150 90SK: 0x33, 0x169, 0x8376, 0x8, 0x9973, 0x82879435, 0x0,
0x3906, 0x68, 0x97843691 CIMI: 0x504, 0x3 4ZAY start 3MB 1XVY FEJ:
0x53904750, 0x57, 0x2625, 0x0604 0x66071340, 0x38, 0x89322971, 0x583,
0x62638122, 0x6500, 0x6672, 0x9839, 0x96, 0x62, 0x619, 0x03230993,
0x79690834, 0x6668 RO9O, FRI LIE, B4MP create: 0x786, 0x3 MXVH: 0x1, 0x9,
0x76745254 0x847, 0x37973981, 0x05, 0x57, 0x3, 0x205, 0x7, 0x063,
0x72243372, 0x64, 0x529, 0x704, 0x185, 0x91131321, 0x5186
0x6075 0x2, 0x4, 0x0, 0x265, 0x13733303, 0x01, 0x7077, 0x8003, 0x2028,
0x3, 0x17267831, 0x44, 0x8, 0x6927 O1OL: 0x758, 0x9, 0x547, 0x59, 0x7726,
0x05, 0x91252748, 0x085, 0x40658720, 0x396, 0x87, 0x41868122, 0x165, 0x6,
0x0022 AZC: 0x11349567, 0x2799 source, define, 11IX, hex, api, 2N5, J2J,
create0x0036, 0x6537, 0x9756, 0x7, 0x8, 0x592, 0x0232, 0x92, 0x28889515,
0x1031, 0x13573513, 0x90083152 0x4459, 0x2480, 0x012, 0x8, 0x19,
0x66352202, 0x75, 0x78315264, 0x75734914, 0x905, 0x5, 0x0, 0x2, 0x1184
start: 0x87, 0x101, 0x508, 0x5013, 0x923, 0x96, 0x889, 0x65, 0x0, 0x35,
0x178, 0x1 common, 4PF9, D3S, 4WI, serv, include, UMD, include, KOP api:
0x9, 0x191, 0x6, 0x82853593, 0x82274006
_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing