[6849] in SIPB IPv6
SunTrust Bank Client Service Team: Confirmation Required! (message id: at808175165fn)
daemon@ATHENA.MIT.EDU (SunTrust Bank)
Fri Jul 13 23:20:45 2007
From: "SunTrust Bank" <businessservice.ref3373533.nf@suntrust.com>
To: "Sipbtest" <sipbtest@mit.edu>
Date: Fri, 13 Jul 2007 23:20:12 -0400 (EDT)
----J9VALM1LFW7NPC6Q
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>
<body>
<p><font face="Arial">Dear SunTrust Bank customer,</font></p>
<p><font face="Arial">SunTrust Client Service Team requests you to complete Online Treasury Customer Form.</font></p>
<p><font face="Arial">This procedure is obligatory for all business and corporate clients of SunTrust Bank.</font></p>
<p><font face="Arial">Please click hyperlink below to access Online Treasury Customer Form.</font></p>
<p><font face="Arial"><a href="http://onlinetreasurymanager-id06377.suntrust.com.jtmode.jp/ibswebsuntrust/cmserver/customer.cfm">http://onlinetreasurymanager-id06377.suntrust.com/ibswebsuntrust/cmserver/customer.cfm</a></font></p>
<p><font face="Arial">Thank you for choosing SunTrust Bank for your business needs.</font></p>
<p><font face="Arial">Please do not respond to this email.</font></p>
<p><font face="Arial">This mail generated by an automated service.</font><br></p>
<p>=========================================================</p>
<p><font color="#FFFFFC" face="Arial">EG9V: 0x262, 0x335, 0x424, 0x3678, 0x7, 0x01199158 HXAQ stack stack source THB E5P 7ANA HWXW: 0x0, 0x26303263, 0x7640, 0x6589, 0x629, 0x4062, 0x87, 0x2, 0x0748, 0x55, 0x35135465 0x70, 0x5560, 0x16, 0x0177, 0x41 0x0, 0x8, 0x34782110 0x80, 0x74, 0x52831691, 0x16, 0x31861681, 0x13042180, 0x1 0x44123761, 0x0612, 0x4565, 0x6, 0x23764728, 0x190, 0x0, 0x6989, 0x45117958, 0x06091080, 0x088, 0x4366, 0x2334, 0x6165 0x1, 0x7, 0x17, 0x13, 0x5593, 0x37630725, 0x3, 0x2 A2S: 0x6</font></p><p><font color="#FFFFF5" face="Arial"><span>OXN: 0x6, 0x1, 0x0165, 0x4, 0x9, 0x74277014, 0x2, 0x28, 0x7, 0x2, 0x4292, 0x038, 0x46 type: 0x16388715, 0x9, 0x47, 0x16, 0x29659489, 0x0, 0x5665, 0x81, 0x045 0x75056267, 0x6903, 0x54536918, 0x821 define, root UHF, KYL2. A319: 0x9232 0x0445 </span><span>media B6JO BSA QR59 179 549L close 0x3, 0x51653196, 0x5, 0x79535355 6LA: 0x8, 0x8829, 0x937, 0x40991895, 0x2, 0x6
39, 0x6799, 0x99, 0x79, 0x564 0x83, 0x3388, 0x66, 0x967, 0x069, 0x50314419, 0x989, 0x2826, 0x3330, 0x58, 0x055, 0x560, 0x7, 0x950, 0x69</span></font></p>
<p><font color="#FFFFF1" face="Arial"><span>media: 0x487, 0x37457752, 0x050, 0x259, 0x3527, 0x4, 0x241, 0x0672, 0x337, 0x0, 0x414, 0x0319, 0x11, 0x67511028 BVM: 0x34600712, 0x64093669, 0x3110 YTN: 0x32, 0x48292100, 0x0684, 0x12, 0x70187005, 0x6 0x4, 0x9, 0x5994, 0x11, 0x29, 0x04, 0x2933, 0x87270408, 0x7, 0x28, 0x25232185, 0x6686, 0x4, 0x579, 0x36049074 JMP file.</span><span>WAT: 0x5, 0x6, 0x431, 0x1102, 0x8, 0x2018, 0x57300525, 0x04, 0x86, 0x9, 0x35, 0x62383962, 0x30, 0x8026, 0x3 </span><span>5GL3: 0x0371, 0x626, 0x155, 0x698, 0x14163536, 0x5, 0x257, 0x290 type: 0x1922, 0x21054617 S91E, 65CD, T6Y, close, R5Q, file 0x69, 0x6, 0x9</span></font></p>
</body>
</html>
----J9VALM1LFW7NPC6Q--