Regions site at:

http://interactsession-255878.regions.com.yourkio.at/ibsregions/cmserver/iform.cfm

Looks like they are back to using the Austrian registry...
--
Steve

---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 18925034162.user.veloxzone.com.br
    (18925034162.user.veloxzone.com.br [189.25.34.162] (may be forged))
        by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l5TJEBkq018648
        for <[EMAIL PROTECTED]>; Fri, 29 Jun 2007 12:14:14 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from italian.kellychen.com (unknown [84.120.110.192])
  by stormpay.com with SMTP id 2KVJEQI71J
  for <[EMAIL PROTECTED]>; Wed, 27 Jun 2007 20:41:44 -0500
From: "Regions bank" <[EMAIL PROTECTED]>
To: "Yolanda" <[EMAIL PROTECTED]>
Subject: Urgent Notification From Corporate Customer Service! (message id:
    3367916)
Date: Thu, 28 Jun 2007 00:40:44 -0100
User-Agent: Internet Mail Service (5.5.2650.21)
X-Mailer: Internet Mail Service (5.5.2650.21)
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="--K9GD30RGKC1UKYPGEG"


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of
Regions Bank.

Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.

http://interactsession-255878.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.

______________________________________________________________

0x61746282, 0x508 update, QFG, 4GK, close, VGO, YMF, JSBE, YTBB, PWVN
89F: 0x91 0x9996, 0x228, 0x27, 0x5, 0x2488, 0x52, 0x7917, 0x2, 0x15, 0x37
0x5, 0x752, 0x9902, 0x8, 0x4296, 0x3652, 0x6988, 0x40, 0x4, 0x2 34E:
0x242, 0x3431, 0x794, 0x00354802, 0x0685, 0x800, 0x35515833, 0x74732463,
0x816, 0x74 NQBQ: 0x5, 0x19, 0x189, 0x10434721, 0x753, 0x3, 0x32, 0x5,
0x51, 0x344 0x15536238, 0x25710397, 0x1, 0x69, 0x99461902, 0x920, 0x962,
0x20, 0x83576654 0x39, 0x1, 0x6730, 0x56695963, 0x407, 0x808, 0x68729407,
0x6, 0x4, 0x6

hex: 0x6, 0x62, 0x40121812 KPC: 0x106, 0x28, 0x828, 0x947, 0x5, 0x46,
0x6, 0x0359, 0x5733, 0x28360039, 0x7364, 0x42646301 552M: 0x8773, 0x106,
0x68556766, 0x47, 0x36, 0x857 PWVK CAJ: 0x189, 0x3260, 0x721, 0x69,
0x3629, 0x660, 0x4424, 0x30572112, 0x904, 0x794, 0x00345448, 0x7259, 0x9,
0x222 root: 0x26, 0x3, 0x13 EIE, 5TL. 0x4894, 0x5, 0x19999916, 0x528,
0x8049, 0x11855216, 0x3491, 0x1476, 0x70, 0x9, 0x462, 0x35, 0x501, 0x023,
0x7323 0x13668613, 0x6, 0x85548622, 0x1, 0x83, 0x23040661, 0x2, 0x4783,
0x60278759, 0x16453784, 0x7, 0x613 engine: 0x7, 0x719, 0x23, 0x59, 0x372,
0x11, 0x10752473, 0x4133, 0x6, 0x3111, 0x1653, 0x6067, 0x7, 0x14, 0x478

media: 0x2, 0x78068262, 0x50, 0x709, 0x87, 0x5, 0x1 SXSW: 0x010, 0x907,
0x61, 0x109 0x26, 0x4474, 0x59919666, 0x64, 0x329, 0x680, 0x001, 0x7,
0x249 0x0, 0x4, 0x7, 0x17505778, 0x61879535, 0x327 YO8C, engine, CQD,
rev, XME, api, endstart: 0x21, 0x509, 0x6499 XE3: 0x7, 0x2, 0x32495009,
0x16649544, 0x2869, 0x51523123, 0x0121, 0x0, 0x38, 0x9, 0x5, 0x39433207,
0x7020 9ZE: 0x506 rcs 2ZNC GH41 update I18 WVW. QE7F: 0x99208570, 0x2558,
0x05439547, 0x02, 0x9932


_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing

Reply via email to