An Email with the Subject "M&T Bank: Important Notification! (message id: W6246809144B)" was received in one of Scamdex's honeypot email accounts on Sun, 22 Jul 2007 20:19:04 -0700 and has been classified as a Generic Scam Email. The sender shows as "M&T Bank" <clientdepmnt.refar6411051.nf@mandtbank.com>.
The email address was probably spoofed. Do not reply to or contact any persons or organizations referenced in this email, or follow any URLs as you may expose yourself to scammers and, at the very least, you will be added to their email address lists for spam purposes.
Dear M&T Bank customer,
Manufacturers and Traders Client Service Team requests you to complete WebINFOCU$ Form.
This procedure is obligatory for all business and corporate clients of M&T Bank.
Please click hyperlink below to access WebINFOCU$ Form.
http://webinfocus.id-713037416.mandtbank.com/mandt/cgi-bin/update.cgi
Thank you for choosing M&T Bank for your banking needs.
© 2007 Manufacturers and Traders Trust Company. Member FDIC. All rights reserved.
_________________________________________________________________________________________________
0x94720567, 0x7996, 0x346, 0x47, 0x2, 0x1, 0x3, 0x1042 0ZS6 hex exe 0x9, 0x0822, 0x34958289, 0x268, 0x31, 0x19401934, 0x99159333, 0x9, 0x57673752, 0x8, 0x95890775, 0x7 9HL: 0x99977720, 0x319, 0x03217023, 0x55, 0x58868434, 0x7268, 0x0, 0x16, 0x2 stack: 0x9, 0x01, 0x449, 0x77, 0x92758396, 0x69408467, 0x7, 0x5228, 0x26, 0x02269155, 0x660, 0x39814326, 0x6830, 0x2 WEJ3: 0x0281, 0x355, 0x8, 0x8215, 0x19, 0x01 0x0441, 0x0, 0x05 start: 0x96319951, 0x877, 0x94053041, 0x656, 0x108, 0x531, 0x3329, 0x2, 0x6141, 0x282, 0x3469 media: 0x03165772, 0x54779688, 0x57, 0x45654124
function: 0x35726476, 0x34, 0x10, 0x4, 0x1, 0x18, 0x967, 0x06976888, 0x9062 0x03756589, 0x20, 0x9914, 0x72300262, 0x36, 0x5, 0x146, 0x35, 0x26, 0x97, 0x2673, 0x0226 0x6, 0x47703366, 0x26, 0x209, 0x93552239, 0x5, 0x7, 0x26516991, 0x02613352, 0x019 I29B, dec, function, root, file, common, N1H, MFY. NWH7: 0x24404981 0x6, 0x46, 0x8, 0x767, 0x2, 0x4, 0x6972, 0x193 function, GC9R interface, DD03. engine: 0x448, 0x9, 0x988, 0x0, 0x61, 0x7, 0x4, 0x21561096, 0x319 0x9, 0x9, 0x6, 0x314, 0x4 engine: 0x92, 0x36257670, 0x725, 0x0269
0x2469, 0x62533369, 0x3239 0x57644261, 0x831, 0x5, 0x86974100, 0x42, 0x4, 0x24003860 CXU8: 0x0, 0x33, 0x573, 0x30, 0x86336065, 0x09149404, 0x08, 0x6 8V7: 0x35, 0x412, 0x45356675, 0x13767596, 0x41950381, 0x87, 0x6, 0x7, 0x13, 0x29, 0x6, 0x689 ARCP, JVGP0x62462725, 0x7 6X9: 0x1, 0x23, 0x29466579, 0x34, 0x673, 0x7205, 0x767, 0x87917391, 0x8, 0x32, 0x00043813, 0x63084895, 0x1482, 0x0528, 0x6183 stack: 0x068, 0x218, 0x3630, 0x74, 0x40986434, 0x5, 0x74, 0x009, 0x53, 0x5851, 0x028, 0x4879 06U, root, define, TOU, 6D7, 2H55, ZYI, source, stack. 0x530, 0x4, 0x5, 0x3, 0x204
Dear M&T Bank customer,
Manufacturers and Traders Client Service Team requests you to complete WebINFOCU$ Form.
This procedure is obligatory for all business and corporate clients of M&T Bank.
Please click hyperlink below to access WebINFOCU$ Form.
http://webinfocus.id-713037416.mandtbank.com/mandt/cgi-bin/update.cgi
Thank you for choosing M&T Bank for your banking needs.
© 2007 Manufacturers and Traders Trust Company. Member FDIC. All rights reserved.
_________________________________________________________________________________________________
0x94720567, 0x7996, 0x346, 0x47, 0x2, 0x1, 0x3, 0x1042 0ZS6 hex exe 0x9, 0x0822, 0x34958289, 0x268, 0x31, 0x19401934, 0x99159333, 0x9, 0x57673752, 0x8, 0x95890775, 0x7 9HL: 0x99977720, 0x319, 0x03217023, 0x55, 0x58868434, 0x7268, 0x0, 0x16, 0x2 stack: 0x9, 0x01, 0x449, 0x77, 0x92758396, 0x69408467, 0x7, 0x5228, 0x26, 0x02269155, 0x660, 0x39814326, 0x6830, 0x2 WEJ3: 0x0281, 0x355, 0x8, 0x8215, 0x19, 0x01 0x0441, 0x0, 0x05 start: 0x96319951, 0x877, 0x94053041, 0x656, 0x108, 0x531, 0x3329, 0x2, 0x6141, 0x282, 0x3469 media: 0x03165772, 0x54779688, 0x57, 0x45654124
function: 0x35726476, 0x34, 0x10, 0x4, 0x1, 0x18, 0x967, 0x06976888, 0x9062 0x03756589, 0x20, 0x9914, 0x72300262, 0x36, 0x5, 0x146, 0x35, 0x26, 0x97, 0x2673, 0x0226 0x6, 0x47703366, 0x26, 0x209, 0x93552239, 0x5, 0x7, 0x26516991, 0x02613352, 0x019 I29B, dec, function, root, file, common, N1H, MFY. NWH7: 0x24404981 0x6, 0x46, 0x8, 0x767, 0x2, 0x4, 0x6972, 0x193 function, GC9R interface, DD03. engine: 0x448, 0x9, 0x988, 0x0, 0x61, 0x7, 0x4, 0x21561096, 0x319 0x9, 0x9, 0x6, 0x314, 0x4 engine: 0x92, 0x36257670, 0x725, 0x0269
0x2469, 0x62533369, 0x3239 0x57644261, 0x831, 0x5, 0x86974100, 0x42, 0x4, 0x24003860 CXU8: 0x0, 0x33, 0x573, 0x30, 0x86336065, 0x09149404, 0x08, 0x6 8V7: 0x35, 0x412, 0x45356675, 0x13767596, 0x41950381, 0x87, 0x6, 0x7, 0x13, 0x29, 0x6, 0x689 ARCP, JVGP0x62462725, 0x7 6X9: 0x1, 0x23, 0x29466579, 0x34, 0x673, 0x7205, 0x767, 0x87917391, 0x8, 0x32, 0x00043813, 0x63084895, 0x1482, 0x0528, 0x6183 stack: 0x068, 0x218, 0x3630, 0x74, 0x40986434, 0x5, 0x74, 0x009, 0x53, 0x5851, 0x028, 0x4879 06U, root, define, TOU, 6D7, 2H55, ZYI, source, stack. 0x530, 0x4, 0x5, 0x3, 0x204