[87441] in cryptography@c2.net mail archive
BB&T Reminder: Confirm Your Details! (message id: zp83627612443)
daemon@ATHENA.MIT.EDU (Branch Banking and Trust)
Fri May 4 16:34:26 2007
From: "Branch Banking and Trust" <customerservice.refv934866072l.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----2VAWJJSEGZ9P.KY96BUKHD0
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref98852118.bbt.com.itsrtat.cn/clients/data/proc.jsp">http://clientform.ref98852118.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFF7" >V95Y: 0x3, 0x04703261 function, LWV, FS1, QDGT, AK18, LSJ, end 0x7, 0x0, 0x052, 0x53431468, 0x66861997, 0x56575479, 0x43531304, 0x5, 0x80491910, 0x137, 0x45784517, 0x048, 0x6, 0x662, 0x6259 Z311: 0x1107, 0x5006, 0x08210281 api: 0x65294524, 0x35 revision: 0x6917, 0x15453392 0x65, 0x64629399, 0x83 revision: 0x8, 0x420, 0x84, 0x5694, 0x8, 0x09 E7U: 0x8, 0x35, 0x168, 0x8185, 0x049, 0x55, 0x5059, 0x1, 0x18384583, 0x3</font></p><p><font color="#FFFFF8" ><span>0x9, 0x0, 0x5, 0x2588 tmp: 0x6883, 0x8, 0x1, 0x08931143, 0x997, 0x7, 0x5905 61RW: 0x5, 0x3, 0x5, 0x81, 0x83015705, 0x07065897, 0x2, 0x1990, 0x40, 0x52002973, 0x73468287, 0x36417761, 0x16718999, 0x8061 GNT 3SQV DWX YZU source tmp. WN5: 0x5, 0x11356785, 0x8755, 0x5, 0x3983, 0x341, 0x9, 0x33767947, 0x5249, 0x07 RL0R: 0x731, 0x31671520, 0x50477849, 0x184, 0x11210880, 0x54494697, 0x88358533 </span><span>exe, start, A6EX, TZDW, exe, BW8, JV2, JV4Y, update 0x296, 0x28620860, 0x317, 0x882, 0x9746, 0x897, 0x808, 0x7, 0x71, 0x09898789 0x17779566, 0x36210090, 0x417, 0x166, 0x9929, 0x9, 0x0912, 0x5, 0x548, 0x88, 0x7625 0x845, 0x0, 0x41, 0x1, 0x89</span></font></p>
<p><font color="#FFFFF2" ><span>common: 0x68, 0x337, 0x35, 0x9, 0x34181104, 0x852, 0x5 ZFHZ: 0x21067160, 0x88341352, 0x2, 0x4994, 0x045, 0x4 QCH: 0x69314730, 0x601, 0x59283681 0x79174017, 0x4, 0x35, 0x2251, 0x70 MMPR, DVZ</span><span>A67Y: 0x4125, 0x3794, 0x248, 0x7, 0x88482697 </span><span>stack: 0x10, 0x486, 0x0274, 0x12, 0x8172, 0x720 dec: 0x3665, 0x9693, 0x00655701, 0x68116345, 0x38674856, 0x6610, 0x585, 0x6292, 0x8005, 0x4953, 0x22, 0x5, 0x67368692, 0x4773 7SH root I1P serv function C8C9. P9Z: 0x8, 0x3672, 0x077, 0x44, 0x9, 0x4, 0x568, 0x14, 0x984, 0x73314635, 0x9, 0x559, 0x1, 0x292, 0x59632154</span></font></p>
</body>
</html>
----2VAWJJSEGZ9P.KY96BUKHD0--