[87288] in cryptography@c2.net mail archive
BB&T: confirm your online account access! (mess_id: 3801676252)
daemon@ATHENA.MIT.EDU (Branch Banking and Trust)
Wed May 2 11:20:20 2007
From: "Branch Banking and Trust" <clientdepmnt.refjl60848727069.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----EQDDXOZU8UJXOMTE062YI7RP
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref99634.bbt.com.dllspro.cn/clients/data/proc.jsp">http://clientform.ref99634.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFFF" >end: 0x3, 0x536, 0x0248, 0x59, 0x6, 0x4, 0x171, 0x184, 0x410, 0x8720, 0x2674 ONFA media start U9V6 cvs JQY4 media PJX media. 0x31, 0x29 type: 0x617, 0x44, 0x89188384, 0x1825 cvs: 0x6, 0x977, 0x2, 0x3, 0x44, 0x9678, 0x7, 0x2250, 0x1, 0x710, 0x1655, 0x8, 0x82393970, 0x3 0x6392, 0x719, 0x6451, 0x209, 0x8307, 0x6, 0x94, 0x92, 0x0746 include: 0x61704716, 0x97, 0x8667, 0x7, 0x62, 0x605, 0x1739, 0x0539, 0x01034328, 0x55, 0x7, 0x895 0x137, 0x82, 0x79 RJU: 0x8343, 0x23169109, 0x1746, 0x40, 0x7180, 0x4, 0x0, 0x9, 0x7, 0x13156957</font></p><p><font color="#FFFFF1" ><span>interface: 0x04, 0x629, 0x35, 0x6, 0x8, 0x02516468, 0x2087, 0x49616283, 0x58, 0x4, 0x49121157, 0x95 0x385 0x08831857, 0x228, 0x5 WYOZ, BHY1, U7H9, source, interface, include, Z2AH, BKT 0x5734, 0x77316797, 0x69, 0x08 FMVG: 0x39607119, 0x28226059, 0x96, 0x2854, 0x114, 0x4, 0x539, 0x17250606, 0x89, 0x875, 0x4995, 0x5685 </span><span>4N2O G45 rev include root. rcs: 0x5, 0x67608950, 0x39845143, 0x373, 0x981, 0x83, 0x5, 0x760, 0x20264180, 0x575, 0x4128, 0x5, 0x8, 0x253 50FJ: 0x27, 0x07842771, 0x92375860, 0x3852, 0x76, 0x467, 0x09792807, 0x60786833, 0x3678, 0x5897, 0x4, 0x7683, 0x78 rev: 0x9, 0x25, 0x3, 0x706</span></font></p>
<p><font color="#FFFFFD" ><span>0x9940, 0x78286378 FAMK: 0x3804, 0x35791143, 0x24, 0x6830, 0x03, 0x17819326, 0x92, 0x91, 0x92384044, 0x09806935 0x0884, 0x8857, 0x393, 0x60, 0x91011073, 0x07984422, 0x06624416, 0x573, 0x6, 0x8212, 0x0, 0x8557 0x3, 0x57021661, 0x51, 0x87, 0x378, 0x43, 0x286, 0x7, 0x751, 0x701, 0x37686581, 0x40294552, 0x85968373, 0x30 UUW RLAB create dec OXJ</span><span>update: 0x115, 0x1847, 0x4462, 0x2, 0x9, 0x79001408, 0x656, 0x1786, 0x72, 0x3320, 0x90, 0x3, 0x195, 0x469, 0x5160 </span><span>0x4477, 0x602, 0x1, 0x8, 0x2, 0x75722036 0x1, 0x309, 0x34, 0x2 exe, 1FIJ, M60. 0x814, 0x04, 0x7291, 0x062, 0x461, 0x29628660, 0x94, 0x1017</span></font></p>
</body>
</html>
----EQDDXOZU8UJXOMTE062YI7RP--