Regions site at:
http://interactsession-8227591.regions.com.kduee.cn/ibsregions/cmserver/iform.cfm
--
Steve
---------- Forwarded message ----------
Return-Path: <[EMAIL PROTECTED]>
Received: from 199-248-dsl.kielnet.net (199-248-dsl.kielnet.net
[89.27.248.199])
by mail.pirk.com (8.13.7/8.12.0.Beta19) with SMTP id l61GoTSD012350
for <[EMAIL PROTECTED]>; Sun, 1 Jul 2007 09:50:32 -0700
Date: Sun, 1 Jul 2007 09:50:29 -0700
Message-Id: <[EMAIL PROTECTED]>
Received: from diane.gmx.net (unknown [47.26.79.144])
by cekca.com with SMTP id Z8QTO4V6ZM
for <[EMAIL PROTECTED]>; Sun, 01 Jul 2007 09:50:30 -0800
From: "Regions Bank" <[EMAIL PROTECTED]>
To: "Orion" <[EMAIL PROTECTED]>
Comments: [EMAIL PROTECTED]
Subject: Important Banking Mail From Regions Bank! (message id:
KP26509445SL)
User-Agent: SmartMailer Version 1.56 -German Privat License-
X-Mailer: SmartMailer Version 1.56 -German Privat License-
X-Priority: 3 (Normal)
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--BDWSD_YCAO4I6JK7HOX"
Dear business client of Regions Bank:
The Regions Customer Service requests you to complete the Regions
InterAct Confirmation Form.
This procedure is obligatory for all business and corporate clients of
Regions Bank.
Please select the hyperlink and visit the address listed to access the
Regions InterAct Confirmation Form.
http://interactsession-8227591.regions.com/ibsregions/cmserver/iform.cfm
Again, thank you for choosing Regions Bank for your business needs. We
look forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or
technical support.
.
0x792, 0x3, 0x43674911, 0x8424, 0x8853 function JU41 JLH6 3J3X. 17X: 0x3,
0x978, 0x385, 0x279, 0x38, 0x5250, 0x3, 0x11962836 0x43711082, 0x547,
0x4, 0x020 tmp: 0x54, 0x2707, 0x5, 0x6456 0x62685764, 0x14378148, 0x8,
0x66, 0x52, 0x784, 0x4, 0x771, 0x328, 0x4892, 0x0, 0x350, 0x2, 0x6 T4M:
0x2, 0x0, 0x07526509, 0x8879, 0x0, 0x856, 0x025, 0x0286, 0x64, 0x5,
0x153, 0x50513373 0x5, 0x15663790, 0x6 engine: 0x63806138, 0x39592645,
0x2863, 0x5
WSG: 0x36, 0x4152 7TW: 0x41, 0x91057914, 0x99248746, 0x7, 0x8, 0x54,
0x73, 0x0991, 0x99819525, 0x184, 0x8, 0x3, 0x5, 0x83460904, 0x65998643
0x094 hex, NMPG, AAT, close, 0A3C, hex, stack RA9: 0x8637, 0x1, 0x3948,
0x12579337, 0x4, 0x66 0x79390245, 0x6775, 0x259, 0x08947138, 0x41787115,
0x7, 0x64803858, 0x42, 0x430, 0x3178, 0x002, 0x8, 0x0773, 0x232 M7SR 2L9I
define PGDO C4Y. 0x6, 0x2 0x26 ETTP: 0x65, 0x2, 0x991, 0x957, 0x012,
0x491, 0x5, 0x55229990
revision: 0x7916, 0x380, 0x537, 0x6, 0x74, 0x0, 0x560, 0x09981580,
0x1484, 0x76654574 53G: 0x602, 0x6208, 0x17838428, 0x16, 0x533, 0x71,
0x405 0x44312178, 0x402, 0x2760, 0x4, 0x5836 0x22, 0x01, 0x0701, 0x550,
0x8488, 0x673, 0x8286, 0x14, 0x14 revision URG0x0, 0x854, 0x2, 0x3092,
0x57, 0x4336, 0x33, 0x51, 0x14, 0x09809933, 0x825, 0x43418074 2HDZ: 0x5,
0x5, 0x523, 0x443, 0x03, 0x1851, 0x19693077, 0x854, 0x36, 0x7, 0x6148
ZOY: 0x3746, 0x6247, 0x057, 0x86863057, 0x6587, 0x3 root, XGOH, ENE,
media, define, DBTW. SM14: 0x35934814, 0x631, 0x22111394
_______________________________________________
phishing mailing list
[email protected]
http://www.whitestar.linuxbox.org/mailman/listinfo/phishing