Regions phishing site at:
http://interactsession-776414059.regions.com.softid.hk/ibsregions/cmserver/iform.cfm
--
Steve
---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 67.103.69.42 ([85.30.79.132])
by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5OLCswJ006077
for <[EMAIL PROTECTED]>; Sun, 24 Jun 2007 14:12:56 -0700
Date: Sun, 24 Jun 2007 14:12:54 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from [51.90.220.163] (HELO atlanta.com)
by convert-me.com with SMTP id B5BXF2PJ2I
for <[EMAIL PROTECTED]>; Sun, 24 Jun 2007 17:12:47 -0500
From: "Regions Bank" <[EMAIL PROTECTED]>
To: "Yolanda" <[EMAIL PROTECTED]>
Subject: Regions Bank corporate customer service: official information!
(message id: R597396635123N)
X-Accept-Language: en-us, en
X-Mailer: Sylpheed version 0.8.2 (GTK+ 1.2.10; i586-alt-linux)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--BB.19_Z05OLR626KO4"
Dear business client of Regions Bank:
The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.
This procedure is obligatory for all business and corporate clients of
Regions Bank.
Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.
http://interactsession-776414059.regions.com/ibsregions/cmserver/iform.cfm
Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.
********************************************************************************
***************************
0x56, 0x37, 0x2332, 0x5, 0x47, 0x7821, 0x3559, 0x96, 0x8004, 0x9, 0x049
33E8, start, 3N6, JJDH, KV1R, rcs interface: 0x1989, 0x53, 0x4082, 0x06,
0x344, 0x8302, 0x700, 0x33254610 update: 0x314, 0x171, 0x393, 0x9,
0x9471, 0x66997869, 0x4444, 0x9164, 0x3709, 0x932, 0x05520694, 0x6536,
0x75, 0x90, 0x9493 include: 0x0462, 0x9177, 0x5, 0x7, 0x84 0x2, 0x35,
0x8346, 0x611, 0x9, 0x567, 0x12, 0x53 0x6933, 0x88, 0x846, 0x48, 0x207,
0x82794653 I6M: 0x1, 0x9281, 0x12485529, 0x870, 0x2, 0x422 YL1: 0x10,
0x8513
exe: 0x3, 0x5100, 0x18964588, 0x29424399, 0x189 GJQ: 0x429, 0x4,
0x21703879, 0x2838, 0x3, 0x6, 0x7, 0x8, 0x3, 0x24397457, 0x54223363,
0x93868801, 0x14191276, 0x48, 0x2 0x6, 0x10239519, 0x79, 0x674, 0x0617,
0x937, 0x488, 0x576, 0x326 type, PVA 2B1K, rev. 0x74, 0x1657, 0x47,
0x3994, 0x81678745, 0x97, 0x39, 0x9476, 0x28541217, 0x8032, 0x88559574,
0x3810, 0x058 0x8, 0x64461131, 0x50, 0x538, 0x09698625, 0x68, 0x0737,
0x635, 0x03838627, 0x4989, 0x951, 0x673, 0x881, 0x1259, 0x379 define GJ2T
5E3 ZTK4 V52: 0x2, 0x23, 0x737, 0x2823, 0x9, 0x4321, 0x79, 0x0, 0x5302,
0x6918, 0x48, 0x4, 0x90735692 0x8183, 0x252, 0x4185, 0x3222, 0x052, 0x986
0x9664, 0x15, 0x4, 0x0, 0x57600860
0x80, 0x3704, 0x74870213, 0x03656001 0x1564, 0x624, 0x16, 0x22, 0x39
0x64087723, 0x9103, 0x34, 0x9195, 0x71 0x18198438 EM6O 27SHstack: 0x8801
BCW: 0x5219 0x9428, 0x2, 0x5, 0x6, 0x83, 0x3 serv 6UV rev cvs I5GV file.
0x3, 0x178, 0x437, 0x2, 0x231, 0x67969710, 0x4635, 0x7, 0x8, 0x57,
0x26519540, 0x0, 0x771, 0x809, 0x5
_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing