Another Regions. Similar domain name...

http://interactsession-443562.regions.com.gilidup.biz/ibsregions/cmserver/iform.cfm

--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 129.214.197-77.rev.gaoland.net
    (129.214.197-77.rev.gaoland.net [77.197.214.129] (may be forged))
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5SGeBru029480
        for <[EMAIL PROTECTED]>; Thu, 28 Jun 2007 09:40:12 -0700
Date: Thu, 28 Jun 2007 09:40:11 -0700
Received: from grungecafe.com (grungecafe.com.pesa.com [54.32.168.186])
  by noscash.com with SMTP id CK086BB1ZY
  for <[EMAIL PROTECTED]>; Thu, 28 Jun 2007 12:39:59 -0500
From: "Regions bank" <[EMAIL PROTECTED]>
To: "Webmaster" <[EMAIL PROTECTED]>
Message-Id:
    <[EMAIL PROTECTED]
    (unknown [46.192.142.192])>
Subject: service notification from Regions Bank! (message id: 6684740150360)
User-Agent: Internet Mail Service (5.5.2650.21)
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--HJ77QJ9M_DMU3QTXXG"


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.

http://interactsession-443562.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.

=

0x7261, 0x802, 0x7, 0x410, 0x4842, 0x04593655, 0x7551, 0x54, 0x24217962,
0x48508541, 0x095, 0x36 92YU UWGQ: 0x4088, 0x19, 0x42, 0x255, 0x86349917,
0x36, 0x36315912, 0x6482, 0x152, 0x517 0x9, 0x8, 0x5, 0x88499323,
0x60491448, 0x2, 0x80, 0x5251, 0x03 IS7: 0x227, 0x48, 0x44471564,
0x21510300, 0x83332509, 0x9, 0x87949751, 0x16, 0x86 0x88602906
0x90336237, 0x8367, 0x0988, 0x06058117, 0x1, 0x3, 0x8712, 0x68363519,
0x3, 0x816 interface: 0x002, 0x88590083, 0x24, 0x11008087, 0x5, 0x3,
0x6040, 0x28436184, 0x1637, 0x18261192, 0x90913374, 0x661 0x85, 0x7247,
0x62, 0x799, 0x3109

start: 0x56, 0x66762760, 0x8366, 0x7533, 0x0007, 0x807 0x21744616,
0x5101, 0x00135623, 0x679, 0x7857, 0x2, 0x53, 0x609, 0x5, 0x7 end: 0x59,
0x06, 0x0669, 0x63949701, 0x46, 0x48, 0x7459, 0x22756808 common, dec,
define 0x26, 0x8389, 0x59127379, 0x7, 0x66, 0x707, 0x8216, 0x8,
0x65621807 cvs: 0x40, 0x01, 0x4109, 0x60, 0x7034 W3OD. 0x47, 0x67,
0x27661028, 0x09, 0x36, 0x03, 0x301, 0x9, 0x6, 0x07778203 0x39, 0x7920,
0x619, 0x7467, 0x97, 0x404, 0x8, 0x7, 0x00448804 GSWX: 0x39, 0x03, 0x2,
0x668, 0x17447699, 0x581, 0x77, 0x18014017, 0x1021, 0x693, 0x14, 0x79,
0x78856851

0x135, 0x139, 0x90, 0x4319, 0x7994, 0x4, 0x054, 0x5, 0x96808149,
0x75813409, 0x8319, 0x3104 0x97220684, 0x0, 0x9815, 0x2881, 0x40, 0x6439,
0x5955, 0x46, 0x17, 0x2, 0x887, 0x45842531 type: 0x499, 0x1, 0x4, 0x2628,
0x1838, 0x9223 0x1526, 0x10, 0x101, 0x35, 0x5, 0x00444619, 0x7812, 0x238,
0x698, 0x652, 0x36772875, 0x69723925, 0x234 close, end, SM9, 4I1, S9H,
CKX, engine, cvs0x57, 0x2, 0x105, 0x39, 0x8111, 0x8250, 0x8, 0x23593470,
0x0 0x3, 0x3, 0x5764, 0x69 0x11189317, 0x77276828, 0x06764862,
0x11296324, 0x43112062, 0x3393, 0x14, 0x6789, 0x0975, 0x66, 0x8, 0x8447
close, EXW1. tmp: 0x27, 0x4, 0x19277074, 0x09, 0x271, 0x030, 0x48


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to