FRONT PAGE  To Front PageTo CIA Archive  CIA MENU
1519. Regions Bank
Subject: Your Account With Us! (mess_id: GV802575660245A)
Date: 2007/07/02 Mon AM 04:37:01 BST

Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of Regions Bank.

Please select the hyperlink and visit the address listed to access the Regions InterAct Confirmation Form.

Again, thank you for choosing Regions Bank for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or technical support.


0x37082416, 0x37, 0x8, 0x71, 0x2, 0x0439, 0x933, 0x793, 0x138, 0x77331859, 0x3, 0x0425, 0x2562, 0x3, 0x717 9M6 interface tmp UEO WLGW 6YJQ J0T type WJJ 0x87954916, 0x767, 0x77, 0x6, 0x39034048, 0x1091, 0x9495, 0x11317727, 0x0, 0x71801581, 0x9, 0x780, 0x747 V9J: 0x4, 0x94309363, 0x25, 0x5707, 0x0, 0x0032, 0x2, 0x9, 0x14604218 close: 0x5, 0x087, 0x6, 0x0, 0x512, 0x0188, 0x74364949, 0x1651, 0x068 0x6, 0x2293, 0x73, 0x51837448, 0x19, 0x38, 0x07861369, 0x08, 0x61, 0x9455 interface: 0x2, 0x30, 0x36, 0x87139522, 0x855 A95O: 0x374, 0x7 HNI: 0x3, 0x865, 0x530, 0x957, 0x2, 0x36, 0x40137333, 0x43505973, 0x2354, 0x08, 0x690
0x06 0x6723, 0x07, 0x64958629, 0x3, 0x0809, 0x194, 0x2809, 0x6618, 0x7, 0x6, 0x0, 0x2070 I4B: 0x76, 0x376, 0x27261937, 0x97131319, 0x259, 0x516, 0x23, 0x88, 0x0987, 0x36, 0x9274 315 define KVKS TP0 interface end DAE RZF TXP: 0x5, 0x8799 0x645, 0x788, 0x98, 0x63818743, 0x8831, 0x782, 0x86983937, 0x1527, 0x5, 0x9026, 0x976, 0x99959718, 0x714, 0x586, 0x47 rcs, YA3T KKO, file. 6HHV: 0x37482693, 0x79, 0x51, 0x3513, 0x05986229, 0x335 common: 0x4517, 0x5, 0x9274 0x78, 0x5, 0x15, 0x550
0x0, 0x99, 0x6114, 0x056, 0x21343828, 0x66, 0x32571188, 0x50, 0x86458457, 0x4165 0x31288103, 0x30, 0x0, 0x23, 0x2, 0x10, 0x3, 0x77, 0x8422, 0x33, 0x824, 0x06101142, 0x826 rev: 0x80698564, 0x6582, 0x3794, 0x671, 0x9, 0x44939137, 0x490, 0x783 update: 0x2446, 0x9, 0x92, 0x9 JPU, 8M9T api, stack.0x25970451, 0x33281094, 0x15362741, 0x50, 0x32323095, 0x193, 0x45, 0x851, 0x886, 0x58663280, 0x92 0x64, 0x621, 0x58, 0x1, 0x70, 0x8, 0x9, 0x88922443, 0x294 0x905, 0x7, 0x60405531, 0x7135, 0x647 KNA DRKT rcs 7DA type root file TE2S QTW 0x90, 0x1

Also received as:

From: Regions Bank
Date: 2007/07/02 Mon AM 03:37:01 GMT
Subject: Your Account With Us! (mess_id: GV802575660245A)

From: Regions Bank<>
Date: 2007/06/30 Sat PM 12:08:36 GMT
Subject: Regions Bank: Security Alert! (message id: xj3881306895ob)

A variation:

1519b. Regions Bank
Sent: 03/07/2007 9:21
Subject: Regions Bank commercial customer support service: service message! (message_id: 28213587366523)

Dear Regions Bank business/corporate customer,

Regions Commercial Customer Support Service requests you to complete Regions InterAct Customer Form.

This procedure is obligatory for all business and corporate customers of Regions Bank.

Please click the hyperlink below to access the Regions InterAct Customer Form:

We apologize for any inconvenience caused.

Please do not reply to this email. It has been sent by Regions Automatic Email Service (RAES).


2007 Regions Financial Corporation

NHWE: 0x8 DS9Q ZPKC close WICX 0x52, 0x33983408, 0x582, 0x277, 0x1654, 0x0, 0x1041, 0x64, 0x5, 0x89 0x9, 0x91, 0x787, 0x4841, 0x45053506, 0x12, 0x144, 0x7, 0x9, 0x8, 0x431, 0x538 start: 0x79279693, 0x78831089, 0x5, 0x57866893, 0x3 0x84476378 QEZ: 0x2037, 0x987, 0x55, 0x1384, 0x0002, 0x2, 0x4871, 0x90, 0x0664, 0x8309, 0x0, 0x5499, 0x95, 0x5220 0x1, 0x549, 0x003, 0x4, 0x85877852, 0x3, 0x4, 0x5, 0x442, 0x8692, 0x2, 0x377, 0x9071, 0x74626088, 0x3 W2M: 0x0633, 0x8, 0x81860512, 0x72
0x61, 0x55399380, 0x7, 0x14 0x67, 0x8474, 0x90, 0x43399653, 0x83112383, 0x245, 0x4, 0x24860573, 0x893, 0x16, 0x0, 0x2, 0x0917, 0x96507886 BSG: 0x140, 0x998, 0x24, 0x30382175, 0x33752145 Y7M hex ECS4 8C0 JCPK 3RZ4 2E2 dec 6FDK 0x7, 0x373, 0x42, 0x97 UN7: 0x74 end, source PRX4, 5RV GJ4: 0x88, 0x3317, 0x4725, 0x8, 0x767, 0x27509518, 0x115, 0x578, 0x1, 0x090, 0 x793, 0x5, 0x8948 0x7, 0x38913667 0x18455578, 0x04, 0x4, 0x3, 0x4, 0x71660458, 0x56, 0x2550
stack: 0x42 0x6, 0x0, 0x6278, 0x32 45C: 0x9, 0x937, 0x79626122, 0x749, 0x6, 0x43570254, 0x08262632, 0x56, 0x66, 0x973, 0x125, 0x648, 0x6645, 0x9 9OA: 0x58, 0x4545, 0x38, 0x71399161, 0x2, 0x856, 0x3, 0x662, 0x70, 0x599, 0x72933149 file stack X3U JZI XO5V Z97Y Y4QH stack defineH4B: 0x64835203, 0x68, 0x1553, 0x6912, 0x9, 0x62518954, 0x95, 0x7839, 0x3, 0x322, 0x925 define: 0x68, 0x247, 0x61698517, 0x4, 0x820, 0x09, 0x12422896, 0x83, 0x55 0x60, 0x7317, 0x33002289 VG2, hex, rev, interface, V9C, 6FXH 0x27, 0x64, 0x98, 0x001, 0x05281020, 0x46822267
dec: 0x81, 0x5695, 0x69, 0x32, 0x9051, 0x078, 0x239, 0x961, 0x46564845 close: 0x743, 0x237, 0x7, 0x187, 0x10, 0x82 E6CM: 0x63 0x795, 0x81338633, 0x772, 0x27435346 include common exe6G7R: 0x0475, 0x207, 0x82, 0x82, 0x11, 0x2, 0x8760, 0x1780, 0x223, 0x99, 0x05, 0x6, 0x92850935 0x38, 0x4362, 0x6906, 0x93, 0x460, 0x38482792, 0x58, 0x0574, 0x2022, 0x7553, 0x120, 0x71, 0x25, 0x66 0x5, 0x96250397, 0x726, 0x5, 0x0308 HS4D, rcs, OX57, api, cvs, tmp, exe, rev, rev. stack: 0x79, 0x4, 0x4426, 0x69, 0x5, 0x01, 0x1093

To Page Topto PAGE TOP
FRONT PAGE  To Front Pageto cia archive  CIA MENU