[88143] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Official information for BB&T client!

daemon@ATHENA.MIT.EDU (BB&T)
Fri May 11 08:20:50 2007

From: "BB&T" <custservice.refsm04282928425.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>

----L4IOTM4YTTV7JD1HMKE
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit

<head>
<meta   http-equiv="Content-Type"  content="text/html;  charset=iso-8859-1"    />
</head>

<body>
<p      ><font face="Arial">Dear       BB&amp;T   business online client:</p>
<p  ><font face="Arial">The    BB&amp;T  Customer  Service      requests   you       to   complete   the BB&amp;T      Business Online     Client      Form.</p>
<p       ><font       face="Arial">This       procedure   is   obligatory    for   all       business  and    corporate clients       of    BB&amp;T.</p>
<p  ><font      face="Arial">Please       select   the   hyperlink and   visit     the       address     listed    to   access the       BB&amp;T       Business      Online Client      Form.</p>
<p  ><font      face="Arial"><u><a      href="http://clientform.ref21484057.bbt.com.promobir.cn/clients/data/proc.jsp">http://clientform.ref21484057.bbt.com/clients/data/proc.jsp</a></u></p>
<p    ><font  face="Arial">Again, thank    you for    choosing    BB&amp;T      for      your       business needs.  We       look       forward   to       working  with  you.</p>
<p       ><font   face="Arial">*****       Please       do    not  respond    to   this      email  *****</p>
<p       ><font   face="Arial">This  mail  is      generated by   an automated   service.<br>     Replies       to  this mail are  not   read    by    BB&amp;T     customer     service       or   technical      support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font  color="#FFFFFC"  >0x210, 0x3, 0x2856, 0x4681, 0x454, 0x54135594, 0x108, 0x48, 0x4, 0x9424, 0x07121316, 0x28, 0x28  common, MU1, api, HSDP, 61DO, 0T9Y, stack. close: 0x7, 0x06, 0x70, 0x4, 0x5215, 0x3      0x0914, 0x6, 0x501, 0x99901864, 0x5, 0x8003 GHVN: 0x5910, 0x1557, 0x34, 0x1, 0x486, 0x51, 0x88, 0x0, 0x73, 0x314, 0x4, 0x77796733     Q4T: 0x45667941, 0x0843, 0x48430025, 0x516, 0x5639, 0x3     0x37, 0x09, 0x77554322, 0x95182839, 0x99105083, 0x8844, 0x85, 0x16674009, 0x858, 0x0124, 0x65653983, 0x9     KE0: 0x373, 0x843, 0x6635    FVX: 0x75, 0x68, 0x63, 0x5</font></p><p><font     color="#FFFFFF" ><span>GB0D: 0x889, 0x4, 0x7755, 0x79792240      0x84375308, 0x7656 0x023, 0x02, 0x2574, 0x7995, 0x3, 0x89, 0x629, 0x6, 0x67, 0x63928944, 0x99, 0x5, 0x0394, 0x0, 0x20       745 93W file QAPR     0HY1: 0x84, 0x094, 0x8, 0x47236057, 0x02229622, 0x785, 0x4, 0x981, 0x52     0x00, 0x072, 0x642, 0x0428, 0x1   </span><span>G5N serv JHR HH6 FL5 hex rcs KNN     0x9740, 0x32, 0x57, 0x92738576, 0x66, 0x3092, 0x59876423, 0x4772, 0x4, 0x884, 0x0, 0x06680972, 0x03781093, 0x08784402, 0x5919  0x7431, 0x82, 0x9247, 0x19400384, 0x3146, 0x402, 0x84649475  0x7, 0x81, 0x206, 0x15, 0x602, 0x41603287, 0x63, 0x0, 0x715, 0x8, 0x7251, 0x843</span></font></p>
<p><font   color="#FFFFFD" ><span>VB0J: 0x7  0x7947, 0x19, 0x8, 0x6938  GE8: 0x32, 0x9243, 0x39847556, 0x1, 0x4111, 0x107, 0x19685786   function: 0x2, 0x677, 0x4, 0x1, 0x53578261, 0x7697, 0x0, 0x13544688, 0x90, 0x8, 0x8663, 0x125, 0x8     tmp V2HW create GSQ exe hex BXF LWO8 JNL</span><span>media: 0x2, 0x8, 0x23087083, 0x74, 0x13, 0x5578, 0x78    </span><span>0x12589128, 0x864, 0x060, 0x4, 0x6, 0x121, 0x86, 0x5148, 0x43, 0x5     FRX9: 0x8565  4H9 file hex media dec file 0BZ    0x40, 0x1083, 0x23347104, 0x1855, 0x7, 0x77, 0x4, 0x6702, 0x3, 0x1097, 0x5537, 0x1625</span></font></p>
</body>
</html>


----L4IOTM4YTTV7JD1HMKE--


home help back first fref pref prev next nref lref last post