The Scamdex Scam Email Archive X

Subject:  Regions Bank Corporate Customer Service: Alert - Online Form Released! (message id: 123701411888)
From:  "Regions bank" <corporateservice.reft1608833fv.cm@regions.com>
Date:  Thu, 31 May 2007 21:54:06 -0700
Category:  Generic
Date Added:  2016-07-20 20:29:48

An Email with the Subject "Regions Bank Corporate Customer Service: Alert - Online Form Released! (message id: 123701411888)" was received in one of Scamdex's honeypot email accounts on Thu, 31 May 2007 21:54:06 -0700 and has been classified as a Generic Scam Email. The sender shows as "Regions bank" <corporateservice.reft1608833fv.cm@regions.com>.

The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.

Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of Regions Bank.

Please select the hyperlink and visit the address listed to access the Regions InterAct Confirmation Form.

http://interactsession-660881251.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or technical support.

=========================================================================================

BEFX: 0x2591, 0x3704, 0x899, 0x66, 0x00308956, 0x75286416, 0x86, 0x43 MYSN, dec. 0x8575, 0x87, 0x53176786, 0x766, 0x142, 0x229, 0x7, 0x32, 0x23195203, 0x0, 0x3 0x3, 0x6, 0x2140, 0x24, 0x0621 GYL0: 0x75, 0x026 0x298, 0x69521453, 0x40, 0x1, 0x092 0x82, 0x8238, 0x5, 0x37, 0x38490776, 0x05282526, 0x7, 0x963, 0x63, 0x188, 0x662, 0x3747, 0x5, 0x0, 0x991 0x2463, 0x70265943, 0x118, 0x995, 0x124, 0x7, 0x589, 0x012, 0x1736, 0x66, 0x81295837 0x9, 0x534, 0x35370773, 0x0

0x9, 0x8, 0x0, 0x979, 0x8822, 0x4569, 0x50088974, 0x70484566, 0x0214, 0x3, 0x00379425, 0x72499523 8QX6: 0x586 XHRZ: 0x0 function tmp engine interface Q2X file QUN6 5CLU KYW 0x6905, 0x572, 0x53708086, 0x87171313, 0x20964775, 0x8905, 0x89, 0x446, 0x39, 0x4434, 0x3484 0x6264, 0x3198, 0x60799336, 0x2470, 0x8465, 0x3, 0x48498342, 0x7, 0x67891511, 0x08, 0x5433, 0x1, 0x2898, 0x2963 < /span>HK7 tmp type api COA D4A: 0x4700, 0x05116683, 0x7 0x021, 0x59, 0x98690354, 0x48, 0x4, 0x83, 0x3287, 0x8946, 0x081, 0x5, 0x40, 0x2295, 0x63936054 0AK: 0x17, 0x46652459, 0x36, 0x40137286, 0x39638917, 0x9500, 0x37

cvs: 0x5, 0x16, 0x2, 0x25 GRY: 0x02, 0x36754076, 0x49422551, 0x8029, 0x472, 0x1691, 0x554, 0x59 0x12976508 0x3, 0x85676187, 0x6, 0x147, 0x49, 0x9226, 0x134, 0x6550, 0x2, 0x661, 0x698, 0x980, 0x97, 0x56951836 XKIV, GGP2 WY4, start.0x339, 0x3081 0x64, 0x3474, 0x2, 0x32, 0x4659, 0x4, 0x8, 0x2613, 0x2781, 0x2445, 0x0, 0x1695, 0x0, 0x4, 0x3980 6ULR: 0x3, 0x33747393, 0x14836913, 0x25889975 9E6I api media KA8D: 0x8317, 0x5376, 0x3, 0x6648


Dear business client of Regions Bank:

The Regions Customer Service requests you to complete the Regions InterAct Confirmation Form.

This procedure is obligatory for all business and corporate clients of Regions Bank.

Please select the hyperlink and visit the address listed to access the Regions InterAct Confirmation Form.

http://interactsession-660881251.regions.com/ibsregions/cmserver/iform.cfm

Again, thank you for choosing Regions Bank for your business needs. We look forward to working with you.

***** Please do not respond to this email *****

This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service or technical support.

=========================================================================================

BEFX: 0x2591, 0x3704, 0x899, 0x66, 0x00308956, 0x75286416, 0x86, 0x43 MYSN, dec. 0x8575, 0x87, 0x53176786, 0x766, 0x142, 0x229, 0x7, 0x32, 0x23195203, 0x0, 0x3 0x3, 0x6, 0x2140, 0x24, 0x0621 GYL0: 0x75, 0x026 0x298, 0x69521453, 0x40, 0x1, 0x092 0x82, 0x8238, 0x5, 0x37, 0x38490776, 0x05282526, 0x7, 0x963, 0x63, 0x188, 0x662, 0x3747, 0x5, 0x0, 0x991 0x2463, 0x70265943, 0x118, 0x995, 0x124, 0x7, 0x589, 0x012, 0x1736, 0x66, 0x81295837 0x9, 0x534, 0x35370773, 0x0

0x9, 0x8, 0x0, 0x979, 0x8822, 0x4569, 0x50088974, 0x70484566, 0x0214, 0x3, 0x00379425, 0x72499523 8QX6: 0x586 XHRZ: 0x0 function tmp engine interface Q2X file QUN6 5CLU KYW 0x6905, 0x572, 0x53708086, 0x87171313, 0x20964775, 0x8905, 0x89, 0x446, 0x39, 0x4434, 0x3484 0x6264, 0x3198, 0x60799336, 0x2470, 0x8465, 0x3, 0x48498342, 0x7, 0x67891511, 0x08, 0x5433, 0x1, 0x2898, 0x2963 < /span>HK7 tmp type api COA D4A: 0x4700, 0x05116683, 0x7 0x021, 0x59, 0x98690354, 0x48, 0x4, 0x83, 0x3287, 0x8946, 0x081, 0x5, 0x40, 0x2295, 0x63936054 0AK: 0x17, 0x46652459, 0x36, 0x40137286, 0x39638917, 0x9500, 0x37

cvs: 0x5, 0x16, 0x2, 0x25 GRY: 0x02, 0x36754076, 0x49422551, 0x8029, 0x472, 0x1691, 0x554, 0x59 0x12976508 0x3, 0x85676187, 0x6, 0x147, 0x49, 0x9226, 0x134, 0x6550, 0x2, 0x661, 0x698, 0x980, 0x97, 0x56951836 XKIV, GGP2 WY4, start.0x339, 0x3081 0x64, 0x3474, 0x2, 0x32, 0x4659, 0x4, 0x8, 0x2613, 0x2781, 0x2445, 0x0, 0x1695, 0x0, 0x4, 0x3980 6ULR: 0x3, 0x33747393, 0x14836913, 0x25889975 9E6I api media KA8D: 0x8317, 0x5376, 0x3, 0x6648