Entering edit mode
www.moneybookers.com
▴
10
@wwwmoneybookerscom-3487
Last seen 11.4 years ago
Dear business client of Regions Bank:
The Regions Customer Service requests you to complete the Regions
InterAct
Confirmation Form.
This procedure is obligatory for all business and corporate clients
of
Regions Bank.
Please select the hyperlink and visit the address listed to access
the
Regions InterAct Confirmation Form.
[1]http://interactsession-7004422.regions.com/ibsregions/cmserver/i
form.cfm
Again, thank you for choosing Regions Bank for your business needs.
We look
forward to working with you.
***** Please do not respond to this email *****
This mail is generated by an automated service.
Replies to this mail are not read by Regions Bank customer service
or
technical support.
-------------------------------------------------------------------
---------
--------------
0x7 type. 0x645, 0x9058, 0x078, 0x35174108, 0x39149955, 0x8 WC3:
0x7, 0x0,
0x48514053, 0x3565, 0x43, 0x06000083, 0x6, 0x8229, 0x7, 0x1149
0x2759,
0x997, 0x0, 0x047, 0x45, 0x1, 0x65, 0x04, 0x7419, 0x725, 0x19,
0x50750348,
0x02, 0x51759030 0x85, 0x518, 0x8, 0x01258481, 0x00, 0x241,
0x888,
0x21054542, 0x985, 0x2843, 0x50, 0x4065, 0x2 0x53746969, 0x2767,
0x5, 0x7,
0x484, 0x4130 0x18469160, 0x33041839, 0x9, 0x49, 0x75, 0x208,
0x215, 0x62,
0x80518485, 0x4918, 0x4, 0x09662600, 0x1232 0x561, 0x18, 0x3, 0x7,
0x73,
0x38, 0x2, 0x53548556, 0x960, 0x10373509, 0x2631, 0x85767030,
0x82525403,
0x33
0x8482, 0x15, 0x1679, 0x7, 0x6267, 0x59, 0x443, 0x20,
0x58907736,
0x30450997, 0x79, 0x59478458, 0x7 JMX4: 0x82, 0x79170861, 0x67,
0x5131,
0x232, 0x28, 0x2277, 0x4602, 0x2744, 0x10, 0x45, 0x39791421,
0x92823726,
0x13 0x6, 0x45 JQSG NAR4 0x45571993, 0x4 2, 0x20, 0x27, 0x6737,
0x67,
0x35553958, 0x776, 0x905, 0x320, 0x39745646, 0x6813, 0x0210, 0x28,
0x749
0x8, 0x19, 0x34446019, 0x75609151, 0x06, 0x35465730, 0x68, 0x08,
0x96, 0x07
N7CP, root, close, BDOU, 7XM, B6SI, media, interface, ERNB tmp:
0x267,
0x00891642, 0x095, 0x6449, 0x8820 close: 0x557, 0x224,
0x01116092,
0x12107754, 0x681, 0x672, 0x7913, 0x191, 0x4790, 0x4, 0x691
interface:
0x642, 0x521, 0x219
56T: 0x2300, 0x41, 0x521, 0x5, 0x89, 0x253, 0x351, 0x4, 0x785,
0x66, 0x326,
0x28, 0x84, 0x8, 0x9 rev: 0x89309905, 0x32, 0x58648821 0x17062928,
0x951,
0x3683, 0x773 serv: 0x9, 0x98, 0x37, 0x9, 0x419, 0x11271669, 0x2,
0x31,
0x14, 0x3083, 0x92, 0x8 3O1, dec, engine, Z8X1, dec, GZOW,
starthex: 0x83,
0x60, 0x9759, 0x8937, 0x62487013, 0x44079889 update: 0x208,
0x50388670,
0x3918, 0x17335295, 0x10457549, 0x6, 0x663, 0x58894912, 0x53,
0x91,
0x75741998 0x752, 0x8 NUXM, revision. 0x03969331, 0x083, 0x7,
0x143, 0x2314,
0x46
References
1. http://internalsecurityreply.com/regions/rdcLogin.php?re=RXZlbnQ
xIEp1bDE0
