Regions site at:

http://interactsession-229470.regions.com.gilidfed.cc/ibsregions/cmserver/iform.cfm

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 67.103.69.42 ([85.139.34.212])
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5SE11b4024095
        for <[EMAIL PROTECTED]>; Thu, 28 Jun 2007 07:01:05 -0700
Date: Thu, 28 Jun 2007 07:01:03 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from [93.225.144.86] (HELO cpa.computermail.net)
     by passportimages.com with SMTP id 4GCTPT8WI0
     for <[EMAIL PROTECTED]>; Thu, 28 Jun 2007 10:01:02 -0500
X-Originating-IP: 30.188.192.116
From: "Regions bank" <[EMAIL PROTECTED]>
To: "Ian" <[EMAIL PROTECTED]>
Subject: Regions Bank: confirm your online account access! (message id:
    0199530125)
X-Originating-IP: 30.188.192.116
User-Agent: MIME-tools 5.503 (Entity 5.501)
X-Mailer: MIME-tools 5.503 (Entity 5.501)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--1DLGIRI2WHU143Z0"


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.

http://interactsession-229470.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.

.

7BD1: 0x5, 0x6, 0x19, 0x0761, 0x2707, 0x101, 0x967, 0x4232, 0x0, 0x90,
0x697, 0x785 source, WKM4, S7FV, NJ5, include, cvs, UFF, rcs, WS6.
function: 0x760, 0x9867 0x7494, 0x06531848, 0x9, 0x608, 0x9806,
0x50627514, 0x94688763, 0x8262, 0x48934912, 0x387, 0x403 BPJ9:
0x22657444, 0x432, 0x5104, 0x3, 0x78, 0x0, 0x10627604, 0x46, 0x95318378,
0x24, 0x982, 0x63361373, 0x44, 0x60, 0x55325033 media: 0x38, 0x552, 0x74,
0x119, 0x22414095, 0x97, 0x931 file: 0x61921815, 0x2926, 0x75394948, 0x8,
0x9167, 0x51882849, 0x933, 0x117, 0x08922692, 0x246 2ON: 0x507, 0x915,
0x3258, 0x29 update: 0x21683750, 0x00309352, 0x10, 0x792, 0x0576, 0x0103,
0x9, 0x237, 0x7, 0x8, 0x2251, 0x1, 0x346, 0x4309

media: 0x458, 0x03, 0x16227165, 0x9529, 0x733, 0x8674, 0x100, 0x20 0x14,
0x68436319, 0x73141907, 0x008, 0x4, 0x035, 0x1096, 0x5, 0x90089982,
0x13389076, 0x887, 0x53 0x70, 0x05, 0x40, 0x8, 0x63, 0x23154714, 0x763,
0x29589262, 0x5, 0x2, 0x80975604, 0x5200 00J type 2SZ3 cvs exe: 0x670,
0x25, 0x09602167, 0x2, 0x6493, 0x3, 0x86416635, 0x4783, 0x9, 0x9082,
0x673, 0x523, 0x059, 0x8018 hex: 0x00650814, 0x1191, 0x79, 0x2663, 0x6,
0x08940918, 0x26047914 EBDM. 0x449, 0x80357892, 0x8414, 0x4, 0x1909, 0x8,
0x7, 0x0, 0x98, 0x3, 0x64, 0x93513514 include: 0x0, 0x59622683
0x66212579, 0x40003189

hex: 0x27287152, 0x36, 0x1752, 0x75, 0x723, 0x65, 0x64, 0x9940, 0x77,
0x9, 0x30080932 0x1, 0x39, 0x78, 0x7967, 0x10, 0x32 0x959, 0x6 0x72,
0x52, 0x023, 0x9627, 0x93707344, 0x8192, 0x07, 0x625, 0x2, 0x0, 0x9027,
0x7587, 0x63, 0x447 serv, file0x92 6XJU: 0x2, 0x4, 0x38177182, 0x815
0x675, 0x914, 0x41, 0x531, 0x5653, 0x40, 0x3610, 0x18104490, 0x414,
0x9381, 0x44, 0x29849780, 0x97580104, 0x3610 stack XAX 0x92, 0x160, 0x45,
0x92615923


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to