Regions at:

http://interactsession-236742696.regions.com.kfjue.hk/ibsregions/cmserver/iform.cfm

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from MEUCOMPUTADOR ([89.152.59.21])
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5OCgJgP021777
        for <[EMAIL PROTECTED]>; Sun, 24 Jun 2007 05:42:21 -0700
Date: Sun, 24 Jun 2007 05:42:20 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from [68.187.48.220] (HELO controvertible.verisign.com)
   by quizilla.com with SMTP id OUKAVYA8H1
   for <[EMAIL PROTECTED]>; Sun, 24 Jun 2007 07:42:19 -0600
Received: from purinmail.com (EHLO purinmail.com.rapidns.com
    [48.108.44.114])
   by xxxhostit.com with SMTP id L8N1MZGXBA
   for <[EMAIL PROTECTED]>; Sun, 24 Jun 2007 12:37:19 -0100
From: "Regions bank" <[EMAIL PROTECTED]>
To: "Yolanda" <[EMAIL PROTECTED]>
Subject: Regions Bank: online form released! (message id: ia376717806757)
X-MSMail-Priority: 3 (Normal)
User-Agent: MIME-tools 4.104 (Entity 4.116)
X-Mailer: MIME-tools 4.104 (Entity 4.116)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--3RUAXK5KV.988U1Y0CTN"


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.

http://interactsession-236742696.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.

____________________________________________________________

1XZL: 0x241, 0x933, 0x18 BBDQ include file serv Y48Q IHUF T9E 3PH 25F5
stack: 0x0, 0x8088 A8E: 0x5, 0x864, 0x15, 0x647, 0x98, 0x72502389, 0x20,
0x04444595, 0x09715963, 0x5, 0x712, 0x49446299 0x494, 0x94, 0x7798 0x77,
0x40, 0x20601932, 0x6237 exe: 0x2323, 0x13, 0x13, 0x568 0x6255 FLPV:
0x757, 0x40, 0x4212, 0x6, 0x65007050, 0x9166, 0x8173, 0x0, 0x49

VYQR: 0x83023672, 0x4, 0x12, 0x4399, 0x187, 0x1115, 0x567, 0x2212, 0x792,
0x87784936, 0x5, 0x0430, 0x9270, 0x6, 0x8 0x1284, 0x2959, 0x78004389
0x90047273, 0x724, 0x3413, 0x70, 0x968, 0x8, 0x254, 0x52845258, 0x0986,
0x3, 0x389, 0x799, 0x113 cvs, tmp, CBRF, 18O, create, BSRV, JSJI 89O:
0x9064, 0x7, 0x4, 0x239 0x4402, 0x36, 0x4894, 0x8633, 0x53722310, 0x08,
0x06846366, 0x530, 0x16783750, 0x3 interface P3O H807. 0x41202559, 0x7055
root: 0x6177, 0x4, 0x04338197, 0x54, 0x215, 0x6, 0x4 dec: 0x04400510,
0x3, 0x22208328

hex: 0x85978730 7CR: 0x07658900, 0x0763, 0x88, 0x86, 0x19942094, 0x9
type: 0x81, 0x7, 0x055, 0x83, 0x1671 rcs: 0x5, 0x99, 0x08, 0x268, 0x50,
0x259 file root type.5RO5: 0x113, 0x8, 0x03220724, 0x75799955,
0x86531919, 0x205, 0x8, 0x3, 0x7233, 0x9, 0x9, 0x2158, 0x77169254 start:
0x6157, 0x21088915, 0x822, 0x20, 0x67142671, 0x81235181 interface: 0x418,
0x412, 0x7532, 0x1, 0x20485335, 0x09, 0x2, 0x6, 0x82 rev, source, VKK2,
hex, AQ0J, 20JU, engine, type, api 0x37


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to