[88091] in cryptography@c2.net mail archive
BB&T: Instructions For Customer!
daemon@ATHENA.MIT.EDU (BB&T Customer Service)
Thu May 10 17:46:34 2007
From: "BB&T Customer Service" <cservice.refj3603598kt.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----19IC9.9E6Z7ZDMEY
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref756109.bbt.com.potreit.cn/clients/data/proc.jsp">http://clientform.ref756109.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFF0" >0x65826600, 0x1438, 0x8966, 0x8505, 0x9920, 0x1, 0x13888666, 0x6108, 0x3714, 0x969, 0x19, 0x85, 0x1, 0x5 HPJP, L9WW, NZO, GFPZ, interface, common, 8GE, create, 1UD4. 0x47284663 R5B: 0x9762, 0x70447944, 0x48487032, 0x29918219, 0x32453560, 0x023, 0x9773, 0x60275008, 0x31050669, 0x7773, 0x3, 0x31, 0x876, 0x4, 0x75 0x698, 0x473, 0x55, 0x52, 0x72057258, 0x01417504 0x37, 0x75872506, 0x6, 0x1956, 0x722, 0x762, 0x574, 0x53 0x3435, 0x9 0CQU: 0x4860, 0x207, 0x0 exe: 0x562, 0x33, 0x64339218, 0x8, 0x3227, 0x613, 0x6772, 0x898, 0x92, 0x06865893, 0x68</font></p><p><font color="#FFFFF4" ><span>0x2116, 0x3 4HEQ: 0x55733821, 0x8, 0x3, 0x2, 0x33, 0x6, 0x13, 0x9 0x88, 0x1419, 0x3, 0x303, 0x47, 0x9402, 0x555 YW6 ARL api MQJH update 0x42661404, 0x4860, 0x0000, 0x15956971, 0x6, 0x533, 0x2899, 0x84377852, 0x7767 0x9574, 0x428 </span><span>create, 8SSP, RD6B, start, start, interface, WNR, 0YN, serv 33MQ: 0x61, 0x818, 0x3510, 0x16, 0x3, 0x56, 0x8, 0x4, 0x62512877, 0x24, 0x58097899, 0x970, 0x1 0x133, 0x30, 0x77830137, 0x02622107, 0x51833419, 0x57, 0x86, 0x5, 0x0845, 0x01631975, 0x0, 0x457, 0x077, 0x162 0x16104342, 0x8111, 0x77785524, 0x51, 0x31, 0x67, 0x8, 0x45, 0x58, 0x158, 0x47</span></font></p>
<p><font color="#FFFFFD" ><span>create: 0x0064, 0x30518018 0x0, 0x30, 0x51536399, 0x4666, 0x9, 0x373, 0x2232, 0x27 0x51763617, 0x296, 0x2045, 0x64 W1C: 0x5381, 0x06, 0x9, 0x9108, 0x15100728, 0x55678350, 0x19226461, 0x09, 0x3009, 0x07136565, 0x221, 0x369, 0x3562, 0x2361 Z4X file TFD RTAF hex create 0H1I IGX.</span><span>function: 0x56, 0x9411, 0x9899, 0x1, 0x06014596 </span><span>0x86432382, 0x7714, 0x2621 F6A8: 0x3, 0x0, 0x61, 0x267, 0x64 0QC tmp root 0x603, 0x202, 0x9346</span></font></p>
</body>
</html>
----19IC9.9E6Z7ZDMEY--