Lucene search

K
ciscothreatsCiscoCISCO-THREAT-32294
HistoryJan 02, 2014 - 7:14 p.m.

Threat Outbreak Alert: Fake Account Payment Information Email Messages on April 24, 2014

2014-01-0219:14:32
Cisco
tools.cisco.com
27

Medium

Alert ID:

32294

First Published:

2014 January 2 19:14 GMT

Last Updated:

2014 April 25 12:30 GMT

Version:

70

Summary

  • Cisco Security has detected significant activity related to spam email messages that claim to contain payment information for the recipient. The text in the email message attempts to convince the recipient to open the attachment to view the payment advice. However, the .zip attachment contains a malicious .exe file that, when executed, attempts to infect the system with malicious code.

Email messages that are related to this threat (RuleID8337 and RuleID8337KVR) may contain the following files:

> Pnew order.zipPurchase Order.zipaymentAdvice.zip
PaymentAdvice.exe
legittimazione.zip
libero.db .exe
Purchase list and Catalog.scr
Purchase_Order_Advice-BFTI_EFT9522013120780.zip
Purchase_Order_Advice-BFTI_EFT9522013120780.exe
New Order.zip
$500,000.exer
bank slip copy.zipr
bank slip copy.exer
payment-history-n582343-4343287496631.zipr
payment-history-n582343-4343287496631.exer
Swift_TT_copy.zipr
Swift_TT_copy.scrr
New WinRAR ZIP archive.zip
Purchase Order.exe
new.zipr
NEWORD~1.EXEr
Swift copy.zipr
Our Orders.zipr
Payment Details.scr
payment slip.zip
payment slip.exe
Payment Slip.scr
Case_5427833.zip
Case{partorderb}.exe
Telex Copy.zip
Telex Copy.exe
New Order-gpj.zip
Quotation?gpj.scr_
Payment_Scan_Copy_pdf.zip
Payment_Scan_Copy_pdf.exe
Court_Notice_Copy_No0351.zip
Court_Notice_copy_document_14_01_2014_USA.exe
Original Copy.zip
Original Copy.scr
Transfer-Slip.zip
Transfer-Slip.jpeg.exe
Judicial_Notice_14_01_2014_No_6769.zip
Judicial_Notice_14_01_2014_Copy_Document.exe
ProductSamples.zip
ProductSamples.pdf.exe
SAMPLE DESIGN.zip
SAMPLE DESIGN.exe
Transfer Confirmation Slip.zip
Transfer Slip.exe
Court_Notice_NY_15_01_2014_Copy_384.zip
Court_Notice_New_York_15_01_2014_copy.exe
Court_Notice_NY_15_01_2014_Copy_008.zip
_Court_Notice_New_York_15_01_2014.exe _
Purchase Order.zip
Court_Notice_NY_15_01_2014_Copy_046.zip
Bank Transfer Slip.zip
Bank Transfer Slip.exe
_Plaint_Note 16_01_14_Copy_433.zip
_Plaint_Note 16_01_2014_Atlanta_Copy.exe
image.scr
_Plaint_Note 16_01_14_Copy_077.zip
Plaint_Note 16_01_2014_Atlanta.exe
Purchase_Order_PI00CC73_pdf.zip
Purchase_Order_pdf PI8958894_Payment_AgreementCopy_PDF.exe

Court_Notice_NY_15_01_2014_Copy_114.zip
Court_Notice_NY_15_01_2014_Copy_235.zip
Court_Notice_NY_15_01_2014_Copy_806.zip
Court_Notice_NY_15_01_2014_Copy_308.zip
Purchase Order(3).zip
Purchase Order.scr
swift copy.zip
New Ogbos.scr
invoice copy.zip
invoice 4.exe
ttpayment.zip
ttpayment.scr
Payment_advice.zip
New Order.exe
Pretrial_Notice_WA_01_21_N1145.zip
Pretrial_Notice_Washington_01_21_copy.exe
New_Order.zip
New_Order.PO.exe
Order For Quote.zip
New_Order.PI.exe
invoice.zip
original_copy.exe
purchase orders.zip
purchase orders.exe
original copy.exe
payment advice.zip
payment advice.scr
Scan Copy.pdf.zip
Scan Copy.pdf.exe
Product-Sample.pdf.exe
product sample.zip
product sample.exe
Court_Notice_Date_01_23_ID0580.zip
Court_Notice_Date_01_23_Copy_New_York.exe
Purchase Order .zip
Purchase Order .exe
New_Order.PI.zip
New_Order.PO.zip
my picture.zip
Order Sample.zip
Order Sample.scr
Transfer_Slip.zip
Transfer_Slip.scr
Order details.zip
Order details.exe
specification list.zip
specification list.exe
ORDER_RS556098890_2.zip
ORDER_RS556098890.exe
payment details.zip
payment details.exe
PURCHASE ORDER AND DATA SHEET.zip
PURCHASE ORDER AND DATA SHEET.exe
ORDER-#0044.zip
ORDER-#0044.scr
Details_For_Arrears_Document_29-01-2014_Copy_N0719.zip
Details_For_Arrears_Document_29-01-2014_Copy.exe
Order_0161173.zip
Order.exe
Payment Advice.exe
NewWirePaymentDetails.zip
NewWirePaymentDetails.exe
Complete Order.zip
Complete Order.scr
remittance copy.zip
remittance copy.scr
Order l.zip
_Order 100 Metric ton of steel.exe
_Lawsuit_Details Attache_N097-17.zip
_Copy_Lawsuit_Details _Court Bailiff.exe
_Lawsuit_Details Attache_N348-78.zip
_Lawsuit_Details Attache_N647-99.zip
TT-PAYMENT–CONFIRMATION.zip
TT-PAYMENT–CONFIRMATION.exe
Sample.zip
Files.exe
_Lawsuit_Details Copy_ID778-25.zip
_Lawsuit_Details Court Secretary.exe
_Lawsuit_Details Copy_ID473-56.zip
Payment receipt Barclays PA77392733.zip
Payment receipt Barclays PA77392733.exe
_Lawsuit_Details Copy_SN_04-787.zip
_Lawsuit_Details Court Secretary_02-04-2014.exe
Payment Advice TT Copypdf.zip
Payment Advice TT Copypdf.exe
SAMPLE PHOTO.jpg.zip
SAMPLE OF PHOTO.jpg.exe
Payment-order.zip
Payment.exe
HSBC_Payment.zip
HSBC_Payment.scr
COPY .zip
TTCOPY.scr
payslip.zip
payslip.exe
PAYMENT SLIP RECIEPT pdf.zip
new_orderss–fdp.exe
tt_payment.zip
tt_payment.scr
Filee9199091488.zip
copy87389389938893893.scr
Product Order.zip
Product Order.scr
product.exe
Swift_TT_Copy.zip
Swift_TT_Copy.exe
Product.scr
Payment Slip_fdp.zip
Payment Slip#U202efdp.exe
Payment Invoice pdf.zip
Document.exe
PAYMENT (TT SLIPS).zip
PAYMENT (TT SLIPS).exe
payment slip copy.zip
payment slip copy.exe
Sample product picture.zip
Order PI1#U202e#U202efdp.exe
Court_Statement_7719-91.zip
Copy_of_the_court_statement.exe
New payment.zip
New payment.exe
Invoice Copy.exe
Original_Copy.zip
order PI.zip
order PI.scr
Forderung der abgewiesenen Buchung BoKo berall.zip
BoKo berall Anwalt stornierte Lastschrift.com
Payment Copy.zip
Payment Copy.exe
sample list.zip
sample list.exe
payment copy.zip
DocumentAttached-pdf.scr
TTcopy20.19.14.pdf.zip
TTcopy20.19.14.pdf.exe
New Product Order (1).zip
New Product Order.scr
Payment copy.scr
Order.zip
Order.scr
HMRC_E36EDF1CF5.zip
order_3762234-429423.pdf.exe
Sample Picture_Klako Group.zip
Sample Picture_Klako Group.exe
New Godwin (2).scr
NEW PURCHASE ORDER.zip
Shipping Document.zip
Product Sample#U202e#U202efdp.exe
Forderung der abgewiesenen Buchung Martin Schlegel.zip
Anwalt stornierte Kontolastschrift 21.02.2014.zip
Herr Josef Mack Forderung der abgewiesenen Buchung Unterschneidheim.zip
Herr Josef Mack Anwalt stornierte Rechnung Unterschneidheim.com
PurchaseOrder.rar
invoice copy(3).zip
invoice copy(1).exe
Payment.zip
PAYMENT AND ORDER APPROVAL DOCS.zip
PAYMENT AND ORDER APPROVAL DOCS.scr
DOCS_1419.exe
SAMPLE ORDER.zip
quotation.exe
invoice copy[1].exe
93da853750dda283645c2869360dcbf2.zip
copy768794332299876.exe
25.02.2014 Forderung der abgewiesenen Zahlung Harry Steinherr.zip
Harry Steinherr Anwaltskanalei stornierte Kontolastschrift.com
Invoive #4253 Payment Copy.zip
advancepayment.exe
Purchase Ord#U202efdp.exe
Purchase_Order.zip
Purchase_Order.exe
Confirmation.zip
BankSlip.exe
epayment.zip
epayment.exe
sample_gpj.zip
socket sample.exe
PRODUCT SPECIFICATION.zip
PI.exe
Payment-Slip.zip
Payment-Slip.jpg.exe
03.03.2014 Forderung der abgewiesenen automatischen Lastschrift.zip
Inkasso Anwaltschaft stornierte Kontolastschrift.com
Balance Payment.zip
Balance Payment.exe
Payment Invoice.zip
New OrderPI.zip
New OrderPI.exe
Remittance Slip for March Order.zip
Puchase Order.zip
Puchase Order.exe
samples.zip
2_4ed6ff0a33c9ce8cd8dd2a05364e74c3_samples.exe
ORDER 773-29300-19983 (10.03.2014).zip
ORDER 773-29300-19983 (10.03.2014).exe
INVOIC~2.EXE
Order#1018.zip
Order#1018.exe
PAYMENT_SLIP.zip
ORDERF~1.EXE
Purchase Order…zip
Purchase Order.pdf.exe
Sample.scr
Wire-Transfer.copy.zip
Wire-Transfer.copy.exe
Payment Details…zip
invoice.exe
TT Payment Swift Copy.zip
TT Payment Swift Copy.exe
11.03.2014 Forderung der abgewiesenen automatischen Kontoabbuchung.zip
Beauftragte Anwaltschaft stornierte Rechnung.com
tt-payment.zip
tt-payment.scr
ORDER APPROVAL.zip
ORDER APPROVAL.scr
Quotation.zip
payment copy.com
Product.zip
.Product.exe
sample111…zip
Purchase_Order_List_01.zip
Purchase_Order_List_01.exe
Quote_94048.zip
Payment Rcpt.exe
Products New Order.zip
Products New Order.exe
New Order.pdf.zip
New Order.pdf.exe
TRIAL ORDER.zip
TRIAL ORDER.scr
Deposite.exe
Purchase_Order‮fdp.zip
_PURCHA~1.EXE _
New Product.zip
drawing sample__fdp.zip
drawing sample#U202e#U202efdp.exe
PaymentSlip16840-pdf.zip
PaymentSlip16840-pdf.exe
TransferPaymentReceipt_2.zip
TransferPaymentReceipt.exe
TT PAYMENT CONFIRMATION.zip
TT PAYMENT CONFIRMATION.exe
Document.zip
Swift copy.exe
Order-201404029.exe
DRAFT COPY (2).zip
DRAFT COPY (2).exe
Forderung der abgewiesenen Lastschrift 25.03.2014 Patrick Clark.zip
Patrick Clark Inkasso Anwaltschaft stornierte Lastschrift.com
Crypted.exe
attached_document-pdf.exe
New Order (1).zip
New Order.scr
f99a139bdefbeb96c0baabfb0d0f6028.zip
ATTACH~1.EXE
remitslip.zip
remitslip.exe
bank_west.exe
sample_catalogues.zip
sample catalogues.pdf.exe
New Order.jpeg.zip
New Order.jpeg.scr
Payment Confirmation deatils.zip
Payment Confirmation deatils.scr
product details (2).zip
product details (2).exe
payment voucher.zip
tto.exe
PO…zip
Original TT Copy.zip
Original TT Copy.exe

QOUTATION AND AGREEMENT.zip
Order-PI.exe
Order-PI.exe
tt copy.zip
tt copy.exe
Order List.zip
Order List.exe
tt.payment.zip
tt.payment.scr
Forderung der abgewiesenen Lastschrift 03.04.2014 Jtkckhcyk.zip
Jtkckhcyk Inkasso Buro stornierte Lastschrift.com
Order Spec.zip
Order Spec.exe
transfer copy…zip
product catalog.com
Products_list.zip
product list.exe
ORDER pdf.scr
Original_Copy(1).exe
Payment mode.zip
Purchase order.pdf.zip
Purchase order.pdf.scr
order.xls_2.zip
order.xls.exe
doc…zip
housefly.exe
newOrder.doc.zip
newOrder.scr
po 7000140111.zip
sample.exe
statement.zip
NEW ORDER…exe
ITEMSSAMPLE.pdf.zip
ITEMSSAMPLE.pdf.exe
SCAN COPY.zip
SCAN COPY.exe
PURCHASE_ORDER 00456.zip
PURCHASE-ORDER-FROM-JGN-SOLUTIONS-INC.scr
AccountDocs.zip
AccountDocs.SCR
Attach.Slip.zip
Attach.Slip.exe
ttCopy04.zip
ttCopy04.exe
Copy_of_the_court_notice_PO5629.zip
Please_print_this_invoice.exe
Payment Slip004…exe
Shipping Documents.zip
Shipping Documents.exe
SwiftCopySlip.zip
DOC_2864.scr

_Order details 273062.zip
Order details 273062.exe
OrderConfirmation-36001114.zip
OrderConfirmation-36001114.exe
3459876 shipment docs.zip
3459876 shipment docs.exe
order#1533673739.zip
order#1533673739.exe
MODELS SPEC.zip
Easter Order.zip
Product Sample & Quotation.zip
Product_Sample.exe
Order.PO.zip
Order.PO.exe
Quotation and product sample.zip
Quotation and product sample.exe
PO 64610.scr
photo.zip
DSC_0658(copy).jpg.exe
SWIFT_COPY-pdf.zip
SWIFT_COPY-pdf.exe
DOC_Ref-[1190309720910]-PDF.zip
DOC_Ref-1190309720910-PDF.exe
original document.pif
Payment-Copy.zip
Payment-Copy.exe
597430_R00018.DOC.ZIP
597430_R00018.DOC.exe
Payment_notice.zip
Payment_notice.rar.scr
SAMPLE-3845.zip
PO_3847.exe
Mar kyc payment.xlsx.zip
Mar kyc payment.xlsx.scr
TT_COPY-PDF.zip
TT_COPY_00116286271-PDF.exe _
>
> _ _

The PaymentAdvice.exe file in the PaymentAdvice.zip attachment has a file size of 12,288 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0x055812FA076DB0DB57A30952312FDEFA

The libero.db .exe file in the legittimazione.zip attachment has a file size of 1,899,520 bytes. The MD5 checksum is the following string: 0x42C8AFD8A9A186F35CFAAAAAF6E34D65

The Purchase list and Catalog.scr file has a file size of 865,280 bytes. The MD5 checksum is the following string: 0x671CD2C16913DD4A00EA00D74D8B6AD2

The Purchase_Order_Advice-BFTI_EFT9522013120780.exe file in the Purchase_Order_Advice-BFTI_EFT9522013120780.zip attachment has a file size of 299,016 bytes. The MD5 checksum is the following string: 0x79477B3BFDA458E6ED3CD6BD5950C2A7

The $500,000.exe file in the New Order.zip attachment has a file size of 650,448 bytes. The MD5 checksum is the following string: 0x290313F6AC028E385AF40B831E6A00DF

The bank slip copy.exe file in the bank slip copy.zip attachment has a file size of 981,392 bytes. The MD5 checksum is the following string: 0xBB4F932095B40CADBA7E1F10CA35DE0E

The payment-history-n582343-4343287496631.exe file in the payment-history-n582343-4343287496631.zip attachment has a file size of 17,920 bytes. The MD5 checksum is the following string: 0x88780362D9092D561E23B13C263C0B69

The Swift_TT_copy.scr file in the Swift_TT_copy.zip attachment has a file size of 429,369 bytes. The MD5 checksum is the following string: 0x88C296E70788D77E647141BD8B4076E1

The Purchase Order.exe file in the New WinRAR ZIP archive.zip attachment has a file size of 759,696 bytes. The MD5 checksum is the following string: 0x99569F2F4FCBEA34E48A45CB7BA1506C

The NEWORD~1.EXE file in the new.zip attachment has a file size of 1,633,486 bytes. The MD5 checksum is the following string: 0x47246F678D93039D27C9E003381CF8A3

The Swift copy.exe file in the Swift copy.zip attachment has a file size of 336,896 bytes. The MD5 checksum is the following string: 0x91B35362B84484806EFD9AD72476671A

A variant of the swift copy.exe file in the_ swift copy.zip_ attachment has a file size of 928,144 bytes. The MD5 checksum is the following string: 0x21E1A0EF59214ADFF05DC9028EA73635

The Payment Details.scr file in the Our Orders.zip attachment has a file size of 719,872 bytes. The MD5 checksum is the following string: 0x7EF9EF1A200D1739DF5F301FE283230E

The payment slip.exe file in the payment slip.zip attachment has a file size of 1,135,863 bytes. The MD5 checksum is the following string: 0xA0CA0FE0D62A1550D5FDD92AC01263DD

The Payment Slip.scr file has a file size of 443,123 bytes. The MD5 checksum is the following string: 0x6036502AA9291B15997B6E5D1885CB2C

The Case{_partorderb}.exe _file in the _Case_5427833.zip _attachment has a file size of 131,072 bytes. The MD5 checksum is the following string: 0x873AF000D567F0B8ACB501D6C399174A

The Telex Copy.exe file in the Telex Copy.zip attachment has a file size of 18,432 bytes. The MD5 checksum is the following string: 0x026845EDC6BD08C1625A048E03CCFD52

A variant of the Telex Copy.exe file in the Telex Copy.zip attachment has a file size of 1,461,760 bytes. The MD5 checksum is the following string: 0x7FC0D02D33DE6B4DF76580E7F809E35B

The Quotation?gpj.scr_ file in the New Order-gpj.zip attachment has a file size of 443,123 bytes. The MD5 checksum is the following string: 0x71FD86B00486227AADB8F430FC92E0AE

The Payment_Scan_Copy_pdf.exe file in the Payment_Scan_Copy_pdf.zip attachment has a file size of 1,470,429 bytes. The MD5 checksum is the following string:0x19E4B3F9FF05AB4A9843EB8628B9C1C6

The Court_Notice_copy_document_14_01_2014_USA.exe file in the Court_Notice_Copy_No0351.zip attachment has a file size of 221,696 bytes. The MD5 checksum is the following string: 0xF8D4A1581AC9E752FCA465051120E90B

The Original Copy.scr file in the Original Copy.zip attachment has a file size of 340,121 bytes. The MD5 checksum is the following string: 0x1DC046C60C7FE2581E956B88EFBD19D2

The Transfer-Slip.jpeg.exe file in the Transfer-Slip.zip attachment has a file size of 948,112 bytes. The MD5 checksum is the following string: 0xA1D2E35F63598D3056F881E21DCDE292

The Judicial_Notice_14_01_2014_Copy_Document.exe file in the Judicial_Notice_14_01_2014_No_6769.zip attachment has a file size of 223,232 bytes. The MD5 checksum is the following string: 0x112872B08C92FA49C07F10C72D55BD51

The _ProductSamples.pdf.exe _file in the ProductSamples.zip attachment has a file size of 1,127,824 bytes. The MD5 checksum is the following string: 0x035F2570D08542C610FEF37CADF5C460

The SAMPLE DESIGN.exe file in the SAMPLE DESIGN.zip attachment has a file size of 281,913 bytes. The MD5 checksum is the following string: 0x7A6890B82ED592515E03B58893DC92F4

The Transfer Slip.exe file in the Transfer Confirmation Slip.zip attachment has a file size of 963,984 bytes. The MD5 checksum is the following string: 0xEC098DF2DA8A234CBF1374CBBD368542

The Court_Notice_New_York_15_01_2014_copy.exe file in the Court_Notice_NY_15_01_2014_Copy_384.zip attachment has a file size of 242,176 bytes. The MD5 checksum is the following string: 0x9F4CEBAF343CD94B1E45CBB902A16D1F

The AM-ORDER-323131.exe file in the _AM-ORDER-323131.zip _attachment has a file size of 106,496 bytes. The MD5 checksum is the following string: 0x8536017CE71AF0A600AA736D8BB4D285

The Court_Notice_New_York_15_01_2014.exe file in the Court_Notice_NY_15_01_2014_Copy_008.zip attachment has a file size of 107,520 bytes. The MD5 checksum is the following string: 0x91CAB79038C92160C97036268382C9E2

A variant of the Purchase Order.exe file in the Purchase Order.zip attachment has a file size of 1,107,975 bytes. The MD5 checksum is the following string: 0xC36A64082BEB2A48501CD57A36A2B54D

A variant of the Court_Notice_New_York_15_01_2014_copy.exe file in the Court_Notice_NY_15_01_2014_Copy_046.zip attachment has a file size of 242,190 bytes. The MD5 checksum is the following string: 0x5501025143C856BE7E0641C728722C12

The Bank Transfer Slip.exe file in the Bank Transfer Slip.zip attachment has a file size of 924,560 bytes. The MD5 checksum is the following string: 0x9EC673B6927D0647A3EF6D7A82D7EDC6

The _Plaint_Note 16_01_2014_Atlanta_Copy.exe file in the _Plaint_Note 16_01_14_Copy_433.zip attachment has a file size of 107,520 bytes. The MD5 checksum is the following string: 0xC0408D5BD61C67CE11E87F1D75A8D941

The image.scr file in the PAYMENT SLIP.zip attachment has a file size of 733,236 bytes. The MD5 checksum is the following string: 0x0492DE9FCCDE2773BCBCA21C4D549DA8

The_ Plaint_Note 16_01_2014_Atlanta.exe file in the _Plaint_Note 16_01_14_Copy_077.zip attachment has a file size of 107,520 bytes. The MD5 checksum is the following string: 0x04FFE65B79FD80EBFA17C70717FA06DB

The Purchase_Order_pdf PI8958894_Payment_AgreementCopy_PDF.exe_ file in the Purchase_Order_PI00CC73_pdf.zip attachment has a file size of 1,077,248 bytes. The MD5 checksum is the following string: 0xC8164BE0BCBF0A939BB48CE9E001C1B2

A variant of the Court_Notice_New_York_15_01_2014.exe file in the Court_Notice_NY_15_01_2014_Copy_114.zip attachment has a file size of 107,524 bytes. The MD5 checksum is the following string: 0xD1AC60502604183C6F19833A44F3418F

The Purchase Order.scr file in the Purchase Order(3).zip attachment has a file size of 541,337 bytes. The MD5 checksum is the following string: 0x4C72BEFAFF119BE5BF6F019FB6600EFE

A third variant of the_ Court_Notice_New_York_15_01_2014_copy.exe_ file in the Court_Notice_NY_15_01_2014_Copy_235.zip attachment has a file size of 242,183 bytes. The MD5 checksum is the following string: 0x9B5E288169433A12B5042D9E53933B50

A third variant of the Court_Notice_New_York_15_01_2014.exe file in the _Court_Notice_NY_15_01_2014_Copy_806.zip _attachment has a file size of 107,520 bytes. The MD5 checksum is the following string: 0xBD6B940E122C8B626788E9656834E6BF

A fourth variant of the Court_Notice_New_York_15_01_2014.exe file in the Court_Notice_NY_15_01_2014_Copy_308.zip attachment has a file size of 107,520 bytes. The MD5 checksum is the following string: 0x55611AA64D16A47A370A6750D8C31D52

The New Ogbos.scr file in the _swift copy.zip _attachment has a file size of 535,369 bytes. The MD5 checksum is the following string: 0xE439C5F2C9A728F1182F383F2D495537

The invoice 4.exe file in the invoice copy.zip attachment has a file size of 836,608 bytes. The MD5 checksum is the following string: 0x4591195DFB393046BA38D24A3C99CC2E

The ttpayment.scr file in the ttpayment.zip attachment has a file size of 1,212,416 bytes. The MD5 checksum is the following string: 0x9ECAFF0F3B62116BDF3FA39E083D2784

The New Order.exe file in the Payment_advice.zip attachment has a file size of 776,211 bytes. The MD5 checksum is the following string: 0x21969E6ECA95835AC8C73D7F3EEB5B92

The Pretrial_Notice_Washington_01_21_copy.exe file in the_ Pretrial_Notice_WA_01_21_N1145.zip_ attachment has a file size of 99,328 bytes. The MD5 checksum is the following string: 0x8E15FCE84EC33502D6C528D440344881

The westernunion_order_receipt.exe file in the westernunion_order_receipt.zip attachment has a file size of 131,072 bytes. The MD5 checksum is the following string: 0x873AF000D567F0B8ACB501D6C399174A

The_ New_Order.PI.exe _file in the Order For Quote.zip attachment has a file size of 1,192,957 bytes. The MD5 checksum is the following string: 0x70EC67AF08C21251A0DFBE9B67FFF353

A third variant of the Swift Copy.exe file in the _Swift Copy.zip _attachment has a file size of 3,971,554 bytes. The MD5 checksum is the following string: 0x4EA0C033D20660ACFBB76098FDD2AAD6

The original_copy.exe file in the invoice.zip attachment has a file size of 1,133,267 bytes. The MD5 checksum is the following string: 0xA514EBBD8A16C298360A1736C7343E0C

The purchase orders.exe file in the purchase orders.zip attachment has a file size of 767,488 bytes. The MD5 checksum is the following string: 0x406EB635F50AAE33ED92D85A1B48F12F

The original copy.exe file in the original copy.zip attachment has a file size of 1,133,267 bytes. The MD5 checksum is the following string: 0x2CCC3CC3162B0575ECFB85A7D798541E

The_ payment advice.scr _file in the _payment advice.zip _attachment has a file size of 2,140,416 bytes. The MD5 checksum is the following string: 0x25B67B14C844B70AAEA3498ED50FDE57

The Scan Copy.pdf.exe file in the Scan Copy.pdf.zip attachment has a file size of 1,355,809 bytes. The MD5 checksum is the following string: 0xE85A3D6674BC9E4D4EAC73E2DB84C0BC

The Product-Sample.pdf.exe file has a file size of 1,086,864 bytes. The MD5 checksum is the following string: 0x8C6D0E9D34340898C6A0713EA81CB4AD

The product sample.exe file in the product sample.zip attachment has a file size of 1,201,829 bytes. The MD5 checksum is the following string: 0x5DBB2799D72A1FF5D9612B48DECCB9EF

A variant of the Product Sample.exe file in the Product Sample.zip attachment has a file size of 1,202,659 bytes. The MD5 checksum is the following string: 0x18CC9A03B852C6EC3DEF0F2E63813DAA

The Court_Notice_Date_01_23_Copy_New_York.exe file in the Court_Notice_Date_01_23_ID0580.zip attachment has a file size of 200,704 bytes. The MD5 checksum is the following string: 0x3107CD27E9BCF35276781B389BBA3543

The Purchase Order .exe file in the Purchase Order .zip attachment has a file size of 286,720 bytes. The MD5 checksum is the following string: 0xD4FE0EFC52FDBF2EADEBEE11FB021710

A variant of the New_Order.PI.exe file in the New_Order.PI.zip attachment has a file size of 1,161,483 bytes. The MD5 checksum is the following string: 0xE0E58A2A5C941CC41546D70C3ABCADD3

The New_Order.PO.exe file in the New_Order.PO.zip attachment has a file size of 1,200,387 bytes. The MD5 checksum is the following string: 0x7995BEAEF8440176999A2FA5F9F52A9C

A variant of the purchase orders.exe file in the my picture.zip attachment has a file size of 782,736 bytes. The MD5 checksum is the following string: 0xE729C77EEE912829A11789C6765BB509

The Order Sample.scr file in the Order Sample.zip attachment has a file size of 273,209 bytes. The MD5 checksum is the following string: 0xB79B8889233921E8010E42B85D09828E

The Transfer_Slip.scr file in the Transfer_Slip.zip attachment has a file size of 1,152,381 bytes. The MD5 checksum is the following string: 0x9F02084B30D6821850969117E5EAB489

The Order details.exe file in the_ Order details.zip_ attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0xFA09214F05B7BAF6A66C66E64DEA664A

The specification list.exe file in the specification list.zip attachment has a file size of 439,296 bytes. The MD5 checksum is the following string: 0x60303AC9B0867C455319A222C9491589

The ORDER_RS556098890.exe file in the ORDER_RS556098890_2.zip attachment has a file size of 102,400 bytes. The MD5 checksum is the following string: 0x0CF38A22EC53B0DE31A670301511E83F

The _payment details.exe _file in the payment details.zip attachment has a file size of 892,448 bytes. The MD5 checksum is the following string: 0xAD274A250E0FFFBD6E211716841EB815

The PURCHASE ORDER AND DATA SHEET.exe file in the_ PURCHASE ORDER AND DATA SHEET.zip_ attachment has a file size of 1,050,649 bytes. The MD5 checksum is the following string: 0x520C4A757F5AC4FA6B6334E717B6714C

The ORDER-#0044.scr file in the ORDER-#0044.zip attachment has a file size of 857,088 bytes. The MD5 checksum is the following string: 0xCDE779D514F6BB0F11598BFAB6E59324

The Details_For_Arrears_Document_29-01-2014_Copy.exe file in the Details_For_Arrears_Document_29-01-2014_Copy_N0719.zip attachment has a file size of 168,960 bytes. The MD5 checksum is the following string: 0x47AF02B382B5A3D1FE4B25AD31DFC450

The Order.exe file in the Order_0161173.zip attachment has a file size of 17,920 bytes. The MD5 checksum is the following string: 0x84A6030C8265B33C3C4E68D29975BD76

The Payment Advice.exe file in the Payment Advice.zip attachment has a file size of 17,920 bytes. The MD5 checksum is the following string: 0xE1A142A4EF1FFD653D8F4DFDE4ADB626

A fourth variant of the Swift Copy.exe file in the Swift Copy.zip attachment has a file size of 217,818 bytes. The MD5 checksum is the following string: 0xEBF114D7DAFC3C9A8DF9B94B0A7D8560

The NewWirePaymentDetails.exe file in the NewWirePaymentDetails.zip attachment has a file size of 1,027,860 bytes. The MD5 checksum is the following string: 0x19486AFAE009624E654C7F62B1A828E9

The Complete Order.scr file in the Complete Order.zip attachment has a file size of 984,064 bytes. The MD5 checksum is the following string: 0x46E7F95421D7BCD93DC565F5EE61D015

A variant of the NEW ORDER.exe file in the _NEW ORDER.zip _attachment has a file size of 873,964 bytes. The MD5 checksum is the following string: 0x341EE953E7FB5177D039B8CF38CDD038

A variant of the Original Copy.scr file in the Original Copy.zip attachment has a file size of 285,345 bytes. The MD5 checksum is the following string: 0xF58493975C42FBE0C43D629AF267F9C3

The remittance copy.scr file in the remittance copy.zip attachment has a file size of 422,201 bytes. The MD5 checksum is the following string: 0x8896716958E7B2CC1EB985CECCE5618C

The Order 100 Metric ton of steel.exe file in the Order l.zip_ attachment has a file size of 341,504 bytes. The MD5 checksum is the following string: 0x17942BE017820FDBB611F1D6797AE6BA

The _Copy_Lawsuit_Details _Court Bailiff.exe file in the _Lawsuit_Details Attache_N097-17.zip attachment has a file size of 188,928 bytes. The MD5 checksum is the following string: 0xAB9CA7E431CC8D6C7607972295C14EB4

A variant of the _Copy_Lawsuit_Details _Court Bailiff.exe file in the _Lawsuit_Details _Attache_N348-78.zip _attachment has a file size of 188,928 bytes. The MD5 checksum is the following string: 0xB73A919D3E567DC6099C1C7C3F0BBF79

A third variant of the _Copy_Lawsuit_Details _Court Bailiff.exe file in the _Lawsuit_Details Attache_N647-99.zip attachment has a file size of 188,928 bytes. The MD5 checksum is the following string: 0x2AEEA4A32A0FAD25D5C2EC5AA678473A

The _TT-PAYMENT–CONFIRMATION.exe _file in the TT-PAYMENT–CONFIRMATION.zip attachment has a file size of 346,631 bytes. The MD5 checksum is the following string: 0x93E43F3259563FB179EDE7926F88A159

The Files.exe file in the Sample.zip attachment has a file size of 695,296 bytes. The MD5 checksum is the following string: 0x133E69D5C702FE0B1AA1A39A577C4812

The _Lawsuit_Details Court Secretary.exe file in the _Lawsuit_Details Copy_ID778-25.zip attachment has a file size of 260,608 bytes. The MD5 checksum is the following string: 0x67B838FE53FD62AE2ED9EEA0D2A6A845

A variant of the _Lawsuit_Details Court Secretary.exe file in the _Lawsuit_Details Copy_ID473-56.zip attachment has a file size of 260,608 bytes. The MD5 checksum is the following string: 0x9409A3A823C98D1F9B87EEFEE3EEAD2E

The Payment receipt Barclays PA77392733.exe file in the Payment receipt Barclays PA77392733.zip attachment has a file size of 143,360 bytes. The MD5 checksum is the following string: 0x25DF65EBEE9C3443CFA24F27EC8EDD18

The _Lawsuit_Details _Court Secretary_02-04-2014.exe _file in the _Lawsuit_Details Copy_SN_04-787.zip attachment has a file size of 146,944 bytes. The MD5 checksum is the following string: 0x613034475CC484E21FE321F00B3B7460

A variant of the Payment receipt Barclays PA77392733.exe file in the Payment receipt Barclays PA77392733.zip attachment has a file size of 139,264 bytes. The MD5 checksum is the following string: 0x26470A234ED9595380B648C3BF534856

The Payment Advice TT Copypdf.exe file in the Payment Advice TT Copypdf.zip attachment has a file size of 1,324,085 bytes. The MD5 checksum is the following string: 0x55EC393544C3D93445C2BBB295AF2188

The SAMPLE OF PHOTO.jpg.exe file in the SAMPLE PHOTO.jpg.zip attachment has a file size of 556,608 bytes. The MD5 checksum is the following string: 0x507A6CA39ED5E36EF7E85C7BA33FC85C

The Payment.exe file in the Payment-order.zip attachment has a file size of 874,496 bytes. The MD5 checksum is the following string: 0x5B5A446AA4A3D177EEE844E30EF009C0

The _HSBC_Payment.scr _file in the HSBC_Payment.zip attachment has a file size of 18,944 bytes. The MD5 checksum is the following string: 0xAC107228A8AB69F8726A823F6EB5AC88

The TTCOPY.scr file in the COPY .zip attachment has a file size of 281,201 bytes. The MD5 checksum is the following string: 0x7057161DBFA2575BC6421EA5BF5FC5F8

The payslip.exe file in the payslip.zip attachment has a file size of 688,128 bytes. The MD5 checksum is the following string: 0x27B972BE39865DD71FFA1E746BB8A084

The _new_orderss–fdp.exe _file in the PAYMENT SLIP RECIEPT pdf.zip attachment has a file size of 1,633,197 bytes. The MD5 checksum is the following string: 0xCA1737AAA800E80E555B7AA24811704E

The_ tt_payment.scr_ file in the tt_payment.zip attachment has a file size of 1,351,732 bytes. The MD5 checksum is the following string: 0xCE64FAE58B26F140789D83A2860EFEBA

The copy87389389938893893.scr file in the Filee9199091488.zip attachment has a file size of 269,312 bytes. The MD5 checksum is the following string: 0x9EAE7B4BF1CCC20FEE8681561D52E150

The Product Order.scr file in the Product Order.zip attachment has a file size of 421,177 bytes. The MD5 checksum is the following string: 0x9B57744B453A21C98E3773E8310EF544

The product.exe file in the product.zip attachment has a file size of 688,128 bytes. The MD5 checksum is the following string: 0x3FAAA00035187221CB7455F730AAE39F

The Swift_TT_Copy.exe file in the Swift_TT_Copy.zip attachment has a file size of 212,176 bytes. The MD5 checksum is the following string: 0xA9564297ABCED152590F008C66ED07CE

A variant of the payment slip.exe file in the payment slip.zip attachment has a file size of 707,351 bytes. The MD5 checksum is the following string: 0x6FB2C084D2B7BEE61166C9C1D564C922

The Product.scr file in the_ Product.zip_ attachment has a file size of 1,848,320 bytes. The MD5 checksum is the following string: 0x9700574A8779A049ED9F5E64526385F4

The_ Payment Slip#U202efdp.exe_ file in the _Payment Slip_fdp.zip _attachment has a file size of 741,376 bytes. The MD5 checksum is the following string: 0x4110818A75D0E7948D6B886FDA4133D0

The Document.exe file in the Payment Invoice pdf.zip attachment has a file size of 1,298,432 bytes. The MD5 checksum is the following string: 0xA5071C6418E8B50CB3F6D736B83051FE

The PAYMENT (TT SLIPS).exe file in the PAYMENT (TT SLIPS).zip attachment has a file size of 1,077,384 bytes. The MD5 checksum is the following string: 0xC1FACC2CB4EF60B2DDE8EF5CC5D7B79B

The payment slip copy.exe file in the payment slip copy.zip attachment has a file size of 615,424 bytes. The MD5 checksum is the following string: 0x0D9081B69C363E8ADC19F3ACDB9F35E6

A variant of the Product.exe file has a file size of 483,840 bytes. The MD5 checksum is the following string: 0x451F26B8D058A489C229770C845256CF

The Order PI1#U202e#U202efdp.exe file in the Sample product picture.zip attachment has a file size of 1,626,891 bytes. The MD5 checksum is the following string: 0xA9D1AFD1D9CF2B65EFDD50C5AF09E919

A third variant of the New Order.exe file in the New Order.zip attachment has a file size of 882,342 bytes. The MD5 checksum is the following string: 0x4B7BF01EE43276F82CE4F0D21642DAD0

A third variant of the _Payment Slip.exe _file in the _Payment Slip.zip _attachment has a file size of 881,763 bytes. The MD5 checksum is the following string: 0x7A35BBDEA412D29C3F81E88E0ADC0B94

The Copy_of_the_court_statement.exe file in the Court_Statement_7719-91.zip attachment has an approximate file size of 81,479 bytes. The MD5 checksum is the following string: aac05eef2d834c6707ce898180714628

The New payment.exe file in the New payment.zip attachment has a file size of 368,491 bytes. The MD5 checksum is the following string: 0x04CF2B06A03BB1F609362E5A23DB8779

The Invoice Copy.exe file in the INVOICE COPY.zip attachment has a file size of 970,752 bytes. The MD5 checksum is the following string: 0x71341AB71874D94CE6C97574A944D705

A variant of the payment advice.scr file size in the Original_Copy.zip attachment is unavailable. The MD5 checksum is also unavailable.

The order PI.scr file in the order PI.zip attachment has a file size of 301,929 bytes. The MD5 checksum is the following string: 0x3913E810A5AA9DC8389A16A01B5662FD

A third variant of the Payment receipt Barclays PA77392733.exe file in the Payment receipt Barclays PA77392733.zip attachment has a file size of 314,880 bytes. The MD5 checksum is the following string: 0x6256F6739300D43633683C6550997344

A variant of the payment slip copy.exe file in the payment slip copy.zip attachment has a file size of 626,176 bytes. The MD5 checksum is the following string: 0xC4276AF7C0046136F856BC5263267AB7

The BoKo berall Anwalt stornierte Lastschrift.com file in the Forderung der abgewiesenen Buchung BoKo berall.zip attachment has an approximate file size of 95,139 bytes. The MD5 checksum is not available.

The Payment Copy.exe file in the Payment Copy.zip attachment has a file size of 267,065 bytes. The MD5 checksum is the following string: 0x8205763C4E6861B9E85AC3F2E13FEF10

The sample list.exe file in the sample list.zip attachment has a file size of 1,340,527 bytes. The MD5 checksum is the following string: 0x094A8248B45E91941C7F339E07D10D83

The DocumentAttached-pdf.scr file in the payment copy.zip attachment has a file size of 1,097,842 bytes. The MD5 checksum is the following string: 0x192E93DFF48BEE588DF5A1F71E715C56

The TTcopy20.19.14.pdf.exe file in the TTcopy20.19.14.pdf.zip attachment has a file size of 1,044,694 bytes. The MD5 checksum is the following string: 0xC0C41D179AAF7F685A221B2E0C26F3E8

The New Product Order.scr file in the _New Product Order (1).zip _attachment has a file size of 933,869 bytes. The MD5 checksum is the following string: 0x220A901FF2DE69F180EB6623E3CF49DF

The Payment copy.scr file in the Payment copy.zip attachment has an approximate file size of 934,768 bytes. The MD5 checksum is not available.

The Order.scr file in the Order.zip attachment has an approximate file size of 233,256 bytes. The MD5 checksum is not available.

The order_3762234-429423.pdf.exe file in the HMRC_E36EDF1CF5.zip attachment has a file size of 111,929 bytes. The MD5 checksum is the following string: 0x9784FBCA34ED661157939EB894F4CD9E

The _Sample Picture_Klako Group.exe _file in the _Sample Picture_Klako Group.zip _attachment has a file size of 491,584 bytes. The MD5 checksum is the following string:0xB31905D7B88EDD275A922E72EEDDB50D

The _New Godwin (2).scr _file in the ORDER.zip attachment has a file size of 915,785 bytes. The MD5 checksum is the following string: 0x47CBB275D72C979208C9B6828CC09188

A third variant of the Purchase Order.exe file in the NEW PURCHASE ORDER.zip attachment has a file size of 824,644 bytes. The MD5 checksum is the following string: 0x20CEBD360B7161C76D0AE22AC049B1F9

The Product Sample#U202e#U202efdp.exe file in the Shipping Document.zip attachment has a file size of 1,623,788 bytes. The MD5 checksum is the following string: 0x975C02303CF35D3047EAA8165AF825A9

The Anwalt stornierte Kontolastschrift 21.02.2014.zip file in the Forderung der abgewiesenen Buchung Martin Schlegel.zip attachment has a file size of 78,848 bytes. The MD5 checksum is the following string: 0xFCF83F28358760D7B99C00180DAA0C6F

The_ Herr Josef Mack Anwalt stornierte Rechnung Unterschneidheim.com_ file in the Herr Josef Mack Forderung der abgewiesenen Buchung Unterschneidheim.zip attachment has a file size of 78,848 bytes. The MD5 checksum is the following string: 0xFCF83F28358760D7B99C00180DAA0C6F

A third variant of the Product sample.exe file in the Product sample.zip attachment has a file size of 282,937 bytes. The MD5 checksum is the following string: 0x7F09153AD84DD2699D0EE419723A56CE

A variant of the Payment copy.exe file in the_ Payment copy.zip _attachment has a file size of 1,205,616 bytes. The MD5 checksum is the following string: 0xC4328E61B619FE8FE63A01F0DFAA0B95

A variant of the _Purchase Order.scr _file in the PurchaseOrder.rar attachment has a file size of 268,288 bytes. The MD5 checksum is the following string: 0xA418DC3BD0F8B7F6E3A9F19EB93F6E42

A third variant of the New_Order.PI.exe file in the New_Order.PI.zip attachment has a file size of 1,525,144 bytes. The MD5 checksum is the following string: 0x41A8BFA49E4EADA28B92F22A948EE031

The invoice copy(1).exe file in the invoice copy(3).zip attachment has a file size of 327,680 bytes. The MD5 checksum is the following string: 0xBF00748A0CB6952CC5B7BC3DC7B7FF64

A variant of the Document.exe file in the ORDER.zip attachment has a file size of 3,821,568 bytes. The MD5 checksum is the following string: 0x92B8679E002700C580A994A674165419

A fourth variant of the New_Order.PI.exe file in the New_Order.PI.zip attachment has a file size of 1,525,170 bytes. The MD5 checksum is the following string: 0x827419960D0DF468B75ADCF93911DFE0

A variant of the Payment.exe file in the Payment.zip attachment has a file size of 516,096 bytes. The MD5 checksum is the following string: 0xCE7AEAC1129F07785EF213FBAA5E7BE6

A variant of the invoice copy(1).exe file in the invoice copy.zip attachment has a file size of 323,584 bytes. The MD5 checksum is the following string: 0xE277FD10ED531F2DE413EEA5F9C55320

The PAYMENT AND ORDER APPROVAL DOCS.scr file in the PAYMENT AND ORDER APPROVAL DOCS.zip attachment has a file size of 1,454,563 bytes. The MD5 checksum is the following string: 0xC431FE24A0E57BB02E02466E18472523

The DOCS_1419.exe file in the payment slip.zip attachment has a file size of 763,456 bytes. The MD5 checksum is the following string: 0xA2F3BD808862ED4E759EBA29195ABEE1

The quotation.exe file in the SAMPLE ORDER.zip attachment has a file size of 210,817 bytes. The MD5 checksum is the following string: 0x2B1A13215932A6CA5527544E779E50AF

The invoice copy[1].exe file in the invoice copy.zip attachment has a file size of 323,584 bytes. The MD5 checksum is the following string: 0xEB11F027568712A767BA9E049641578B

The copy768794332299876.exe file in the 93da853750dda283645c2869360dcbf2.zip attachment has a file size of 304,128 bytes. The MD5 checksum is the following string: 0x0C646E7585DE80A83250A09F8D8CC486

A variant of the New_Order.PO.exe file in the New_Order.PO.zip attachment has a file size of 1,442,986 bytes. The MD5 checksum is the following string: 0x308B4418DF4FC1383CCEF53FE79CB624

The Harry Steinherr Anwaltskanalei stornierte Kontolastschrift.com file in the 25.02.2014 Forderung der abgewiesenen Zahlung Harry Steinherr.zip attachment has a file size of 86,329 bytes. The MD5 checksum is the following string: 0x045E008C6F706FA9D493FB40ECD6F183

The advancepayment.exe file in the Invoive #4253 Payment Copy.zip attachment has a file size of 1,183,921 bytes. The MD5 checksum is the following string: 0x2AC0F46B4B6550AD8661E8012A9E0267

The Purchase Ord#U202efdp.exe file in the Purchase Order.zip attachment has a file size of 1,166,336 bytes. The MD5 checksum is the following string: 0x04B15B5382433706E498B2B6FA4351B0

The Purchase_Order.exe file in the_ Purchase_Order.zip_ attachment has a file size of 659,968 bytes. The MD5 checksum is the following string: 0xDCE6715528CE88B20384D1A19D3DDD11

A fifth variant of the New_Order.PI.exe file in the _New_Order.PI.zip _attachment has a file size of 1,615,190 bytes. The MD5 checksum is the following string: 0x99C5805FBBBB431CD5C6519BC5FBDF66

A fourth variant of the_ purchase order.exe _file in the _purchase order.zip _attachment has a file size of 788,544 bytes. The MD5 checksum is the following string: 0x2495A8925BEEF5E04B2D9C2BEC7B7FF2

The BankSlip.exe file in the Confirmation.zip attachment has a file size of 495,616 bytes. The MD5 checksum is the following string: 0x84A5F0E07ACA06E877D7857DEAB00B8A

The epayment.exe file in the epayment.zip attachment has a file size of 226,741 bytes. The MD5 checksum is the following string: 0xCD86DCD8D4391547B09D0B14DC9054FF

A fifth variant of the the Purchase Order.exe file in the Purchase Order.zip attachment has a file size of 538,472 bytes. The MD5 checksum is the following string: 0xF3AE2742371D5B790D3F4D4F27CA888E

The socket sample.exe file size in the sample_gpj.zip attachment is unavailable. The MD5 checksum is also unavailable.

The PI.exe file in the PRODUCT SPECIFICATION.zip attachment has a file size of 1,496,247 bytes. The MD5 checksum is the following string: 0x4F9A489457DF155D464A0CD9C4E6F099

The Payment-Slip.jpg.exe file in the Payment-Slip.zip attachment has a file size of 913,472 bytes. The MD5 checksum is the following string: 0xFE42D20FD8FF1E49C203C7EC9060C51F

The Inkasso Anwaltschaft stornierte Kontolastschrift.com file in the 03.03.2014 Forderung der abgewiesenen automatischen Lastschrift.zip attachment has a file size of 86,329 bytes. The MD5 checksum is the following string: 0xCC5185A6E7A1888C23188C3CDAE6B8F9

A fourth variant of the product sample.exe file in the _product sample.zip _attachment has a file size of 808,448 bytes. The MD5 checksum is the following string: 0xC7E536957E8665F86C7D9F15BD6E9FC6

The Balance Payment.exe file in the Balance Payment.zip attachment has a file size of 635,911 bytes. The MD5 checksum is the following string: 0x54A46F033CDECE94983DE3E8A62218BB

A variant of the _image.scr file in the Payment Invoice.zip _attachment has a file size of 372,736 bytes. The MD5 checksum is the following string: 0xF5ECF91D19A38E6D1C5964CBB79F088B

The New OrderPI.exe file in the New OrderPI.zip attachment has a file size of 1,066,496 bytes. The MD5 checksum, which is a unique identifier of the executable, is the following string: 0xF34070CCA52D9C4D41E92E32AEC156DF

A variant of the sample list.exe file in the Remittance Slip for March Order.zip attachment has a file size of 605,184 bytes. The MD5 checksum is the following string: 0xDE429063AC9163F6E0A706713EB3F689

The Puchase Order.exe file in the Puchase Order.zip attachment has a file size of 327,680 bytes. The MD5 checksum is the following string: 0x6600A0AD74D835C83B70B4DD0938A86E

The 2_4ed6ff0a33c9ce8cd8dd2a05364e74c3_samples.exe file in the samples.zip attachment has a file size of 1,023,938 bytes. The MD5 checksum is the following string: 0x4ED6FF0A33C9CE8CD8DD2A05364E74C3

The ORDER 773-29300-19983 (10.03.2014).exe file in the ORDER 773-29300-19983 (10.03.2014).zip attachment has a file size of 421,888 bytes. The MD5 checksum is the following string: 0x52D6C5933264C68DAF464C32A1D07A41

The INVOIC~2.EXE file in the Payment Invoice.zip attachment has a file size of 625,790 bytes. The MD5 checksum is the following string: 0xA9664EB09751CBE753C33DD564347E77

The Order#1018.exe file in the Order#1018.zip attachment has a file size of 997,416 bytes. The MD5 checksum is the following string: 0xA035392C6E4C2B7ADBC410757DB6758D

The ORDERF~1.EXE file in the PAYMENT_SLIP.zip attachment has a file size of 391,185 bytes. The MD5 checksum is the following string: 0x2F3D62E2DE9B3F6D1F06B060935A3A03

The Purchase Order.pdf.exe file in the Purchase Order…zip attachment has a file size of 81,920 bytes. The MD5 checksum is the following string: 0xEADBDE39108D2F41E026E0106CE46359

The Sample.scr file in the Sample.zip attachment has a file size of 1,601,024 bytes. The MD5 checksum is the following string: 0xE3CD838028E52B2A4A3F9CF98983B2FF

The Wire-Transfer.copy.exe file in the Wire-Transfer.copy.zip attachment has a file size of 593,912 bytes. The MD5 checksum is the following string: 0xA8C99F5158D547C8DE64CD0957C180BB

The invoice.exe file in the Payment Details…zip attachment has a file size of 241,152 bytes. The MD5 checksum is the following string: 0xE62AC22CEFED127B269F9D4DA0AAB6CD

The TT Payment Swift Copy.exe file in the TT Payment Swift Copy.zip attachment has a file size of 637,952 bytes. The MD5 checksum is the following string: 0x99EB241936192C5D57F28277EE4DB2E4

The Beauftragte Anwaltschaft stornierte Rechnung.com file in the 11.03.2014 Forderung der abgewiesenen automatischen Kontoabbuchung.zip attachment has a file size of 83,817 bytes. The MD5 checksum is the following string: 0x4DE0F7B7BA6A243D8EAC6B67372E07E1

The tt-payment.scr file in the tt-payment.zip attachment has a file size of 1,179,648 bytes. The MD5 checksum is the following string: 0xE05191787991ECC99ED8A346927D6D95

The ORDER APPROVAL.scr file in the ORDER APPROVAL.zip attachment has a file size of 1,102,247 bytes. The MD5 checksum is the following string: 0x2C3A550CC3B756B3199482FC7FE3FC5A

The _payment copy.com file in the Quotation.zip _attachment has a file size of 183,313 bytes. The MD5 checksum is the following string: 0x9FB7C960EDD7E83B8CF85A8727D4E3E5

A third variant of the Purchase Order.scr file in the _Purchase Order.zip _attachment has a file size of 299,681 bytes. The MD5 checksum is the following string: 0xCFCC0DAC1FF936BC9782F44E3352B515

The .Product.exe file in the Product.zip attachment has a file size of 610,304 bytes. The MD5 checksum of the executable, is the following string: 0x07297B42FEF47A30AF358E98D4AFAF29

A variant of the sample.scr file in the sample111…zip attachment has a file size of 815,275 bytes. The MD5 checksum of the executable, is the following string: 0x0AFD7A71F105B4EBDF03B81E7256E3A1

A sixth variant of the New_Order.PI.exe file in the New_Order.PI.zip attachment has a file size of 807,603 bytes. The MD5 checksum of the executable, is the following string: 0x46037CB7D59B243CBBED2C4F17E035BE

A variant of the Product.scr file in the Product.zip attachment has a file size of 1,179,648 bytes. The MD5 checksum is the following string: 0xEC2C17170457CDBF3AA502769082139C

The Purchase_Order_List_01.exe file in the Purchase_Order_List_01.zip attachment has a file size of 762,890 bytes. The MD5 checksum is the following string: 0x710B22DE4F988065D1E8A47DE0DA98BE

The Payment Rcpt.exe file in the Quote_94048.zip attachment has a file size of 506,880 bytes. The MD5 checksum is the following string: 0xF1D1DB6759A4BA8B027A485017E5266E

The Products New Order.exe file in the Products New Order.zip attachment has a file size of 848,384 bytes. The MD5 checksum is the following string: 0x7EC8BF8002C2C737F815BFEF93914CC0

The New Order.pdf.exe file in the New Order.pdf.zip attachment has a file size of 1,777,072 bytes. The MD5 checksum is the following string: 0x7403F720E54BE9FF862EDAD9CA1D567B

The TRIAL ORDER.scr file in the TRIAL ORDER.zip attachment has a file size of 287,393 bytes. The MD5 checksum is the following string: 0x4ADCA891B3678E214AA4FE3E335F0FCB

The Deposite.exe file in the Product.zip attachment has a file size of 961,355 bytes. The MD5 checksum is the following string: 0x38F77C4E25BE3873A6DF8A9396932935

The PURCHA~1.EXE file in the Purchase_Order‮fdp.zip attachment has a file size of 392,591 bytes. The MD5 checksum is the following string: 0x73BA213F95636EAA43C0DFC9A0DD7EF4

A third variant of the Product.exe file in the New Product.zip attachment has a file size of 961,355 bytes. The MD5 checksum is the following string: 0x7F69AF6C506DE08918B0F6CCBC394C99

The drawing sample#U202e#U202efdp.exe file in the drawing sample__fdp.zip attachment has a file size of 1,626,336 bytes. The MD5 checksum is the following string: 0x3413325BBF7973362C1F481DF18361DB

A third variant of the sample.scr file in the sample.zip attachment has a file size of 1,288,084 bytes. The MD5 checksum is the following string: 0x19C2715392C6A860300E0E120D404DC8

A sixth variant of the the PURCHASE ORDER.exe file in the PURCHASE ORDER.zip attachment has a file size of 3,816,587 bytes. The MD5 checksum is the following string: 0x7C9266184FB18DEEF2E7AEC50EA5F902

The PaymentSlip16840-pdf.exe file in the PaymentSlip16840-pdf.zip attachment has a file size of 1,492,978 bytes. The MD5 checksum is the following string: 0xFD29C7407208DAE516A1B8625D28F048

The TransferPaymentReceipt.exe file in the TransferPaymentReceipt_2.zip attachment has a file size of 67,072 bytes. The MD5 checksum is the following string: 0xDD38227EF9F7185650D09B8D4FEEB6B0

The TT PAYMENT CONFIRMATION.exe file in the TT PAYMENT CONFIRMATION.zip attachment has a file size of 309,760 bytes. The MD5 checksum is the following string: 0xE811B3ADE79CB3189B8199EA85F09918

The Order-201404029.exe file in the Document.zip attachment has a file size of 1,217,507 bytes. The MD5 checksum is the following string: 0xEAAEE2673BFF4C7CBC9BB5138E968D51

The DRAFT COPY (2).exe file in the DRAFT COPY (2).zip attachment has a file size of 503,808 bytes. The MD5 checksum is the following string: 0x1B44DEA94BA008EE9A0935E0856F968A

A seventh variant of the the Purchase Order.exe file in the Purchase Order.zip attachment has a file size of 538,624 bytes. The MD5 checksum is the following string: 0xEF8ACEA02CFBAE3CF1421F5537A4E271

The Patrick Clark Inkasso Anwaltschaft stornierte Lastschrift.com file in the Forderung der abgewiesenen Lastschrift 25.03.2014 Patrick Clark.zip attachment has a file size of 46,080 bytes. The MD5 checksum is the following string: 0x197D98837C1E867CF980478EE7E88D13

An eighth variant of the the Purchase Order.exe file in the Purchase Order.zip attachment has a file size of 241,664 bytes. The MD5 checksum is the following string: 0xE601472FD6A724DFDD4BDF816A9E46D6

The Crypted.exe file in the Purchase Order.zip attachment has a file size of 367,816 bytes. The MD5 checksum is the following string: 0xF70D55331004FA089CCD474B54E8CC83

The attached_document-pdf.exe file in the Order.zip attachment has a file size of 473,856 bytes. The MD5 checksum is the following string: 0x94E6B50AC239B9F6A32629E064C9A521

The New Order.scr file in the New Order (1).zip attachment has a file size of 547,041 bytes. The MD5 checksum is the following string: 0xE8C827670F9C6B08761DE15E240C2CF0

The ATTACH~1.EXE file in the f99a139bdefbeb96c0baabfb0d0f6028.zip attachment has a file size of 395,264 bytes. The MD5 checksum is the following string: 0xC8AD8209BC2EF1ECCB98E0323FC74F2F

The remitslip.exe file in the remitslip.zip attachment has a file size of 845,373 bytes. The MD5 checksum is the following string: 0xC822C5CC075D82E14D2D7AA860F38479

The bank_west.exe file in the Payment.zip attachment has a file size of 292,712 bytes. The MD5 checksum is the following string: 0xC9A1ED4BCD0BBC7F712B4487E3FB6CED

A variant of the Order details.exe file in the Order details.zip attachment has a file size of 435,712 bytes. The MD5 checksum is the following string: 0x9AFB9275C47C850506D3F95A84AB2F94

The sample catalogues.pdf.exe file in the sample_catalogues.zip attachment has a file size of 949,760 bytes. The MD5 checksum is the following string: 0x2BA6C74741F1037F036677AAB57E1002

The New Order.jpeg.scr file in the New Order.jpeg.zip attachment has a file size of 701,472 bytes. The MD5 checksum is the following string: 0x791EB0BDC51FC513B2A3CA98A3D0AA98

The Payment Confirmation deatils.scr file in the Payment Confirmation deatils.zip attachment has a file size of 557,568 bytes. The MD5 checksum is the following string: 0x8E430AC494BE8945448545F4384E7DB9

The product details (2).exe file in the product details (2).zip attachment has a file size of 578,112 bytes. The MD5 checksum is the following string: 0xCF1281C51D80D302E4430CF14A0189CA

The tto.exe file in the payment voucher.zip attachment has a file size of 396,800 bytes. The MD5 checksum is the following string: 0x8B09D57102F3850154A18452C73006C1

An ninth variant of the the Purchase Order.exe file in the PO…zip attachment has a file size of 2,861,870 bytes. The MD5 checksum is the following string: 0xB22C0A790C3DA1A38AA11625FF794DDB

A variant of the New Order.scr file in the New Order.zip attachment has a file size of 565,913 bytes. The MD5 checksum is the following string: 0x74EFD523012372468DEDC17BDD6110D9

The Original TT Copy.exe file in the Original TT Copy.zip attachment has a file size of 1,294,087 bytes. The MD5 checksum is the following string: 0xB9EAB66B3A82283267DD62DACA8B4480

A variant of the Order.exe file in the order.zip attachment has a file size of 437,456 bytes. The MD5 checksum is the following string: 0x28916DA270FB997548E7C820A0DD97AD

A variant of the ORDER.scr file in the QOUTATION AND AGREEMENT.zip attachment has a file size of 451,584 bytes. The MD5 checksum is the following string: 0x15D3C0988AAF71FE5340D15BF47611D3

A fifth variant of the Swift Copy.exe file in the Swift Copy.zip attachment has a file size of 437,456 bytes. The MD5 checksum is the following string: 0x4C004C297893F2B94B7F5D74E9D98AB3

An eighth variant of the the Purchase Order.exe file in the Purchase Order.zip attachment has a file size of 600,064 bytes. The MD5 checksum is the following string: 0x6E210ECF61AC6F419A72CCBB640935B3

The Order-PI.exe file in the Order-PI.exe attachment has a file size of 1,417,039 bytes. The MD5 checksum is the following string: 0x3556C4E54CC59598FC5AF81B81C09E8E

The tt copy.exe file in the tt copy.zip attachment has a file size of 1,458,503 bytes. The MD5 checksum is the following string: 0xB283B0CB6D3D82A005CC72778F797324

The Order List.exe file in the Order List.zip attachment has a file size of 1689729 bytes. The MD5 checksum is the following string: 0xBAD171EACD8E7A6367F6DF7BD38D7DCB

A fourth variant of the Product.exe file in the Product.zip attachment has a file size of 1,483,087 bytes. The MD5 checksum is the following string: 0xEF00D9D77070595D767BF9F48A80BC26

The tt.payment.scr file in the tt.payment.zip attachment has a file size of 1,036,340 bytes. The MD5 checksum is the following string: 0x1ACC11520C1880B878D0825C111E0F1B

A variant of the ttpayment.scr file in the ttpayment.zip attachment has a approximate file size of 767,242 bytes. The MD5 checksum is the following string: 025e527856949806e2c1c03f78a78272

A variant of the ORIGINAL TT COPY.exe file in the ORIGINAL TT COPY.zip attachment has a file size of 1,370,333 bytes. The MD5 checksum is the following string: 0xDEEA9DD06190D29B31B47CBD2540600C

A Third variant of the order.exe file in the new order.zip attachment has a file size of 1,532,711 bytes. The MD5 checksum is the following string: 0xFA6B2A2F8B89B78D0FC68AE205FB24BC

The Jtkckhcyk Inkasso Buro stornierte Lastschrift.com file in the_ Forderung der abgewiesenen Lastschrift 03.04.2014 Jtkckhcyk.zip_ attachment has a file size of 37,376 bytes. The MD5 checksum is the following string: 0x55B79DC5D801F2B50CBECB822B8C46D0

The Order Spec.exe file in the Order Spec.zip attachment has a file size of 1,759,744 bytes. The MD5 checksum is the following string: 0x71AC33835389B800FE5BDB69786A62B8

A third variant of the new order.scr file in the new order.zip attachment has a file size of 656,896 bytes. The MD5 checksum is the following string: 0xEE81B7B2A677E108FD9371571F5F6122

The product catalog.com file in the transfer copy…zip attachment has a file size of 191,633 bytes. The MD5 checksum is the following string: 0xB0A629D981DB40D694D6F49BC3B662D3

A third variant of the New_Order.PO.exe file in the New_Order.PO.zip attachment has a file size of 1,848,615 bytes. The MD5 checksum is the following string: 0x8031BABA966A65FDE184E4249CD6370E

A variant of the tt.payment.scr file in the_ tt.payment.zip _attachment has a file size of 1,032,244 bytes. The MD5 checksum is the following string: 0xD58E5F225DC72ECEF66240874B195354

The product list.exe file in the Products_list.zip attachment has a file size of 536,576 bytes. The MD5 checksum is the following string: 0xEB3584D28EC2C977AFB953C02566D997

The ORDER pdf.scr file in the ORDER.zip attachment has a file size of 691,017 bytes. The MD5 checksum is the following string: 0x595ABD383D79287A6813E4DCBF4419DC

The Original_Copy(1).exe file has a file size of 1,764,063 bytes. The MD5 checksum is the following string: 0xCDFDAAB8A076426B7C51891A470FE3D0

A variant of the Payment slip.scr file in the _Payment mode.zip _attachment has a file size of 1,126,328 bytes. The MD5 checksum is the following string: 0xD274ABD1B57A6211AC90C34A0A75065E

The Purchase order.pdf.scr file in the Purchase order.pdf.zip attachment has a file size of 219,136 bytes. The MD5 checksum is the following string: 0x5B7BFB0DACCB282EFFCB2714DDCE0ECC

The order.xls.exe file in the _order.xls_2.zip _attachment has a file size of 254,464 bytes. The MD5 checksum is the following string: 0x7365E6A4BD00C2C2B36D76F60E9FF0C8

The_ housefly.exe_ file in the doc…zip attachment has an approximate file size of 245,432 bytes. The MD5 checksum, is not available.

The_ newOrder.scr_ file in the_ newOrder.doc.zip_ attachment has a file size of 1,748,480 bytes. The MD5 checksum is the following string: 0x35D04192C4091F82653536B44F5D98B22

The _sample.exe _file in the _po 7000140111.zip _attachment has a file size of 1,408,815 bytes. The MD5 checksum is the following string: 0xD9C84FA6724293D2064DCBB503E95CA0

The _NEW ORDER…exe _file in the statement.zip attachment has a file size of 1,764,075 bytes. The MD5 checksum is the following string: 0x05BCC7F0170B00A54D2A84951C25D2F1

The_ ITEMSSAMPLE.pdf.exe_ in the_ ITEMSSAMPLE.pdf.zip_ file has a file size of 1,408,821 bytes.The MD5 checksum is the following string: 0xF3A553F49D0805BA372291EC7E495075

A fourth variant of the Payment Slip.exe file in the Payment Slip.zip attachment has a file size of 1,014,272 bytes. The MD5 checksum is the following string: 0x9F6FBFF30874DEA494EA56DCB91B8ADE

The _SCAN COPY.exe _in the SCAN COPY.zip file has a file size of 466,944 bytes.The MD5 checksum is the following string: 0xB7A2FB6A6EF1676698D771D14171A678

A third variant of the_ Product.scr _file in the Product.zip attachment has a file size of 1,251,445 bytes. The MD5 checksum is the following string: 0xE9E4807BF8D21A2C903BFCF39E0A1522

The PURCHASE-ORDER-FROM-JGN-SOLUTIONS-INC.scr in the P_URCHASE_ORDER 00456.zip _file has a file size of 835,584 bytes.The MD5 checksum is the following string: 0x9A48CA18E4321D54E94B46CC0D71FFC0

The AccountDocs.scr in the AccountDocs.zip file has a file size of 19,968 bytes.The MD5 checksum is the following string: 0xF18FBCF6B1A9CDD0DF579ECF862019C6

The_ Attach.Slip.exe_ in the Attach.Slip.zip file has a file size of 777,728 bytes.The MD5 checksum is the following string: 0xAE9AA52E3B81937CB6E88571BCF2A8E9

The_ ttCopy04.exe_ in the_ ttCopy04.zip _file has a file size of 777,728 bytes.The MD5 checksum is the following string: 0xB19F44B86C130CCBDEEA950BF9F25CF0

The Please_print_this_invoice.exe in the Copy_of_the_court_notice_PO5629.zip file has a file size of 163,840 bytes.The MD5 checksum is the following string: 0x08B88AF50E31CE531BE6A2DCDC35A675

The Payment Slip004…exe file has a file size of 437,760 bytes.The MD5 checksum is the following string: 0x68A561E3DA02A411D5C2FF1FB8205C12

The _Shipping Documents.exe _in the Shipping Documents.zip file has a file size of 989,965 bytes.The MD5 checksum is the following string: 0x42A9927070F9ED6E033A0834EE871D4F

The_ DOC_2864.scr_ in the SwiftCopySlip.zip file has a file size of 772,672 bytes.The MD5 checksum is the following string: 0x398C5A8750EA8FE526A9C2366D23B2AC

The Order details 273062.exe file in the Order details 273062.zip attachment has a file size of 188,416 bytes. The MD5 checksum is the following string: 0x350F0DCDA52B7421F76777461A14F249

A third variant of the ORDER.scr file in the Order.zip attachment has a file size of 2,077,631 bytes. The MD5 checksum is the following string: 0x4BBB2F40476BDFBA16597EE4DE64F519

A fourth variant of the ORDER.scr file in the Order.zip attachment has a file size of 2,077,626 bytes. The MD5 checksum is the following string: 0x997EB7D7D5FA95739BE6437501B421D8

The OrderConfirmation-36001114.exe file in the_ OrderConfirmation-36001114.zip_ attachment has a file size of 35,840 bytes. The MD5 checksum is the following string: 0x8BFC1A6AF558A6FB673BE364F7C9EE07

The 3459876 shipment docs.exe file in the 3459876 shipment docs.zip attachment has a file size of 989,804 bytes. The MD5 checksum is the following string: 0x5B4B98707ECAF7498EAD5861B8CEAB8D

The order#1533673739.exe file in the order#1533673739.zip attachment has a file size of 1,059,392 bytes. The MD5 checksum is the following string: 0x4979D69234688E8F9BBE3ECEDBBD3344

A variant of the Crypted.exe file in the MODELS SPEC.zip attachment has a file size of 281,832 bytes. The MD5 checksum is the following string: 0xD895670ACD178873B4F7B42BA484AD57

A third variant of the Crypted.exe file in the Easter Order.zip attachment has a file size of 281,832 bytes. The MD5 checksum is the following string: 0xC467B5603C1B891342013E42082F044F

A sixth variant of the _swift copy.exe _file in the swift copy.zip attachment has a file size of 349,928 bytes. The MD5 checksum is the following string: 0xCE52457F76AE2ABA1541B509A3F833E5

The Product_Sample.exe file in the Product Sample & Quotation.zip attachment has a file size of 239,936 bytes. The MD5 checksum is the following string: 0x9402178AA7D3CD26BCC264B14FE85FEE

A seventh variant of the swift copy.exe file in the swift copy.zip attachment has a file size of 281,832 bytes. The MD5 checksum is the following string: 0x4B9FCF520B49F3AD5B4348A2338300C8

The Order.PO.exe file in the Order.PO.zip attachment has a file size of 1,646,685 bytes. The MD5 checksum is the following string: 0x997249428ADF64A09BDC6A1A51C89BEF

The Quotation and product sample.exe file in the Quotation and product sample.zip attachment has a file size of 475,648 bytes. The MD5 checksum is the following string: 0xBBFE6BC86E31E80DEF04251DCF247AF7

The PO 64610.scr file in the Product Order.zip attachment has a file size of 589,824 bytes. The MD5 checksum is the following string: 0x9FCC4C0EEC9A98FC7A0C607E31E9EA8F

The DSC_0658(copy).jpg.exe file in the photo.zip attachment has a file size of 116,224 bytes. The MD5 checksum is the following string: 0x0DBE797BD32A5BBD7C1C31E5EB86D83A

The webblazer2-crypted.exe in the _neworder.rar _file has a file size of 1,374,131 bytes.The MD5 checksum is the following string: 0x4735B087869771EB4CAC9994670181EB

The DOC_Ref-1190309720910-PDF.exe in the DOC_Ref-[1190309720910]-PDF.zip file has an approximate file size of 1,090,519 bytes. The MD5 checksum, is not available.

The_ original document.pif_ file has a file size of 45,721 bytes.The MD5 checksum is the following string: 0x45D341B7CDAB7E5078F1D32E5E4696F9

A fourth variant of the Payment.exe file in the Purchase Order.zip attachment has a file size of 298,512 bytes. The MD5 checksum is the following string: 0xCF7FF468AE0478B62C242A2CFD6B64FE

The Payment-Copy.exe file in the Payment-Copy.zip attachment has a file size of 374,417 bytes. The MD5 checksum is the following string: 0x03DE3C663A0E608806C534CC04212B56

A fifth variant of the Payment Slip.exe file in the_ Payment Slip.zip_ attachment has a file size of 1,081,652 bytes. The MD5 checksum is the following string: 0xBF610801240913FB377A1277AB9C681A

The 597430_R00018.DOC.exe file in the 597430_R00018.DOC.ZIP attachment has a file size of 49,152 bytes. The MD5 checksum is the following string: 0xC7A709944C2A59A5CB178BA27DCA0871

The Payment_notice.rar.scr file in the Payment_notice.zip attachment has a file size of 82,432 bytes. The MD5 checksum is the following string: 0xF356E4255DD28AD8781C2EF3765C21D2

The PO_3847.exe file in the_ SAMPLE-3845.zip_ attachment has a file size of 738,304 bytes. The MD5 checksum is the following string: 0x96ACDE244C35E68020DBF5028F89E0E7

The Mar kyc payment.xlsx.scr file in the Mar kyc payment.xlsx.zip attachment has a file size of 829,045 bytes. The MD5 checksum is the following string: 0xE4F4EF8AA889AAB3267E884616B23C5D

The TT_COPY_00116286271-PDF.exe file in the TT_COPY-PDF.zip attachment has a file size of 1,256,634 bytes. The MD5 checksum is the following string: 0x0E1A7D8DBB63911F82113F67AE70BD9D

A third variant of the original copy.scr file in the _original copy.zip _attachment has a file size of 211,473 bytes. The MD5 checksum is the following string: 0x4AD107D3339CAA97E551D088AE15A211

The following text is a sample of the email message that is associated with this threat outbreak:

> Subject: FW: Payment Advice - Advice Ref:[GB035044071970] / ACH credits / Customer Ref:[pay run 14/11/13]

Message Body:

**Dear Sir/Madam,
The attached payment advice is issued at the request of our customer. The advice is for your reference only.
Yours faithfully,
Global Payments and Cash Management
HSBC


This is an auto-generated email, please DO NOT REPLY. Any replies to this email will be disregarded.


Security tips
1. Install virus detection software and personal firewall on your computer. This software needs to be updated regularly to ensure you have the latest protection.
2. To prevent viruses or other unwanted problems, do not open attachments from unknown or non-trustworthy sources.
3. If you discover any unusual activity, please contact the remitter of this payment as soon as possible.


This email is confidential. It may also be legally privileged. If you are not the addressee you may not copy, forward, disclose
or use any part of it. If you have received this message in error, please delete it and all copies from your system and notify the
sender immediately by return email.
Internet communications cannot be guaranteed to be timely, secure, error or virus-free. The sender does not accept liability
for any errors or omissions.


“SAVE PAPER - THINK BEFORE YOU PRINT!”**

Or

> Message Body:

Sig.ra Nadia,
altro che estraneit?.
Con vive cordialita’,
Alfonso

Or

> Subject: Re:Purchase list and Catalog

Message Body:

We also want to know the quantity you can provide and please tell
us means of payment and how many days it will take you to produce
after part payment (remit) is made to your account.
Please do view our product list and Catalog in the attachment.
Regards

Or

> Subject:** Payment / Telex Copy**

Message Body:

Dear Sir,
Attached is a copy of the Telegraphic Transfer (Telex Copy) as proof of payment, Please check it and get back to me soon.
Thanks
Jayne Hoyle

Or

> Subject: Re: fund transfer

Message Body:

The transfer has been made to your acc. Pls see the attached fund
transfer slip. I wait
Khaled.

Or

> Subject:**Re: Bank Payment Slip **
Message Body:

Good Day,
Kindly find attached swift copy for $75,000.00 paid into your account today.
Balance will be remitted in coming week. Advice when money has been received.
Accounts Department
Chung Lin,
Country Manager

Or

> Subject: Fw: Incoming Wire Notification.

Message Body:

John Michalski
On Tuesday, January 14, 2014 6:38 PM, “[email protected]” wrote:
Attention Please,
Incoming Wire Notification.
An incoming wire transfer has been received by your financial institution
and the funds deposited to your account on 014-01-2014014-01-2014.
Please download the attached document and view the transfer confirmation
slip to be sure there’s no error on your account that the funds was wired
to. This is because your next of kin said you want it to be wired to this
account as attached.
Thanks For your cooperation
Regards
Customer Service
Bank Of America

Or

> Message Body:

Dear Sir/Madam,
The attached payment advice is issued at the request of our customer. The
advice is for your reference only.
Yours faithfully,

Or

> Subject: PAYMENT ADVICE

Message Body:

Sorry for the delay for payment its due to my illness. Concerns regarding the payment for our goods that are yet undelivered. Now, as you requested, kindly click attachment below for a copy of the wire transfer slip for the complete payment we paid into your company’s account and invoice
Kindly get back to me as soon as possible am worried as we waiting your urgent reply ASAP.
Thanks
Paul Anderson

Or

> Message Body:

Please here is the confirmation Invoice copy from our bank

Or

> Message Body:

Please am sorry for my late reply, i was our of office over the week end
I have attached the copy of t/t payment of US$93,567.00 that was made
in your account on Friday for INVOICE NO.3452 as instructed by my boss.
Kindly download the copy of the transfer and confirm the payment.
I am waiting for your urgent reply.
Thanks.
Anahita

Or

> Subject: #Hearing of your case in Court N#0608-482

Message Body:

Notice to Appear,
Hereby you are notified that you have been scheduled to appear for your hearing that
will take place in the court of New York in January 26, 2014 at 09:00 am.
Please bring all documents and witnesses relating to this case with you to Court on your hearing date.
The copy of the court notice is attached to this letter.
Please, read it thoroughly.
Note: If you do not attend the hearing the judge may hear the case in your absence.
Yours truly,
Donna Mason
Clerk to the Court.

Or

> Message Body:

**Happy New Year,
I write to inform you that we are interested in your products. Find attach our purchase order.
And we would like to inquire about the following:
*Minimum Order Quantity
*Your delivery time
*Payment terms But My payment term is T/T or Letter of Credit.
Best Regards,
C&B Group Limited
office: 6231 Ang Mo Kio Avenue 5, Northstar @ AMK
Unit 08-28, Singapore 569880
Phone: +65 6204-2870+65 6204-2870 +65 6204-2870+65 6204-2870 **

Or

> Subject: Re: Purchase Order

Message Body:

Hello,
Please fine attached purchase order List we want to buy from you, review and send us your price list and quotation.
Kind regards,
Mrs. Sindy Kamer
Pingro Import & Export Ltd
Handicare BV
Vossenbeemd 104
5705 CL Helmond, Netherlands
T + 31 (0) 493 592 888+ 31 (0) 493 592 888 + 31 (0) 493 592 888+ 31 (0) 493 592 888
T + 31 (0) 493 542 894+ 31 (0) 493 542 894 + 31 (0) 493 542 894+ 31 (0) 493 542 894 (direct)
F + 31 (0) 493 537 931
M + 31 (0) 6 4603736

Or

> Message Body:

--
Attn;
Could you please send me Quote for attached items?
Also, advice availability of listed items, prices FOB & estimated time of
delivery.I appreciate your help and prompt response.
INVOICE MUST BE ADDRESSED TO:
NOVEX, Sociedad Anonima
13 Avenida 17-33, zona 10, Guatemala, Guatemala, C.A.
TAX ID: 2591757-9
Please send your invoices with this information otherwise it will be
rejected.
Por favor enviar las facturas con los siguientes datos de lo contrario se
rechazarán.
Byron López
Phone: 502-23795238
Fax: 502-23795245
Email: [email protected]
Website: www.novex.com.gt

Or

> Message Body:

**Dear Sir/Ma,
I have wired the sum of $22,320 Usd into your bank account for the goods. Please confirm if you received this exact sum to your bank account. Attached is the copy of the wire transfer slip . Please go through it and get back to me soonest with a definite response.
Thanks,
Mrs. M Abbas
Elpis Industries


This email has been scanned for all viruses by Star. The
service is powered by MessageLabs. For more information on a proactive
anti-virus service working around the clock, around the globe, visit:
hxxp: //www.star.net.uk


--
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.394 / Virus Database: 268.9.9/382 - Release Date: 04/04/2013**

Or

> Subject: Re: Transaction Alert

Message Body:

Dear Customer,
Below attached is copy of the Telegraphic transfer slip as initiated from our bank to your account as instructed by,your adviced to print out copy of transfer slip for confirmation.
Regards,
Dennison Mark

Or

> Message Body:

Transaction is completed. £3827 has been successfully transfered.
If the transaction was made by mistake please contact our customer service.
Receipt on payment is attached.
Barclays is a trading name of Barclays Bank PLC and its subsidiaries. Barclays Bank PLC is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority (Financial Services Register No. 122702). Registered in England. Registered Number is 1026167 with registered office at 1 Churchill Place, London E14 5HP.

Or

> Subject: Barclays transaction notification #178559

Message Body:

Transaction is completed. £8999 has been successfully transfered.
If the transaction was made by mistake please contact our customer service.
Receipt of payment is attached.
Barclays is a trading name of Barclays Bank PLC and its subsidiaries. Barclays Bank PLC is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority (Financial Services Register No. 122702). Registered in England. Registered Number is 1026167 with registered office at 1 Churchill Place, London E14 5HP.

Or

> Message Body:

**Dear Sir/Madam,
The attached payment advice is issued at the request of our customer.
The advice is for your reference only.
Yours faithfully,
Global Payments and Cash Management
BOA


This is an auto-generated email, please DO NOT REPLY. Any replies to
this
email will be disregarded.


Security tips
1. Install virus detection software and personal firewall on your
computer. This software needs to be updated regularly to ensure you have
the latest protection.
2. To prevent viruses or other unwanted problems, do not open
attachments from unknown or non-trustworthy sources.
3. If you discover any unusual activity, please contact the remitter of
this payment as soon as possible.


This email is confidential. It may also be legally privileged.
If you are not the addressee you may not copy, forward, disclose
or use any part of it. If you have received this message in error,
please delete it and all copies from your system and notify the
sender immediately by return email.
Internet communications cannot be guaranteed to be timely,
secure, error or virus-free. The sender does not accept liability
for any errors or omissions.


“SAVE PAPER - THINK BEFORE YOU PRINT!”**

Or

> Message Body:

Dear Partner,
See a list of NEW ORDER which we want to buy from you, check and send Proforma Invoice immediately for payment.
I will be waiting for your urgent reply.
Thanks with regards
Les Bruce
Managing Director

Or

> Message Body:

Subject: payment order
Payment notification.
Swift code err,
The attachedswift payment TT slip is issued at the request of
our customer. The advice is for your reference only.
Yours faithfully,
Les

Or

> Message Body:

Kindly find attached advance payment for PO#32,
Please issue invoice for new order.
Let me have delivery schedule at earliest.
Thanks
Mehdi Javanei

Or

> Subject: Re:outstanding payment and new order

Message Body:

Find attached transfer copy.
we have made payment today against the invoice no 3746473.
Please confirm from your bank and proceed with production ASAP.
We await confirmation,
Best Gulf Trading Co. L.L.C.

Or

> Subject: down payment

Message Body:

Good day,
This is the 30% down payment as instructed by your organisation. Attached is a copy of payment

Or

> Subject: Purchase Order

Message Body:

**Kindly requested to send us your offer urgently, listed in enclosed list
based on CIF Bandar Abbas ,Iran including all terms and conditions
urgently ( SKF and FAG ,two offers to be compared and decision making).
Please get back to us ASAP with the price list of the listed items in
the attached file below…
Looking forward to your prompt response.
Sincerely yours,
---------------------
M.ganji
Almahdi Group of companies
Km 18 Shaheed Rajaei Port Road, Bandar Abbas, Iran.
Zip code : 79171-7-6385"" **

Or

> Subject: ORDER

Message Body:

Hello,
We are Telran Communication Ltd. is a suppliers company in Israel and we have some customers who are interested in your product.
Please note that Quality is very important to us as product has been previously supplied by a company in Guandong which did not meet customers requirement. Attached is our sample, kindly download attached file to get full details of our order including required quantity and pictures of a sample product model we have previously supplied to our customers.
After viewing our order, kindly send me a quote and include delivery terms, payment methods and any other information necessary. Please treat as urgent and reply within 3days. Note that for reasons of copyright and trademark, we have personally configured the attached file to be only accesible by you. Do not share information with 3rd parties or use our sample products on your company personal website.
We shall wait for your reply email after you must have reviewed our order.
Best Regards
Mrs. Mazal Zilberman , Purchasing Manager Telran Communication (1986) Ltd.
10 Hasadan St.
Holon 58815
Israel
Tel.: 972-3-5575706
Fax: 972-3-5214541
E.mail: [email protected]
www.telran.co.il

Or

> Message Body:

**Attention: Dear Sir
We have a contract supply job for the below listed kindly get back to me asap if they are available also see
the attached file for the our model/specifications

  1. VMC-1500G
  2. SVM-60 or SVM-75 :
  3. HVM-120L & HVM-120H
  4. HVM-110L-BC & HVM-110L-AC
    james churchill
    Magic LL**

Or

> Subject: Fw: Payment Slip…

Message Body:

Re: Payment Slip…
Please respond to
Good Day,
Kindly find attached swift copy for $75,000.00 paid into your account
today.
Balance will be remitted in coming week. Advice when money has been
received.
Accounts Department
Chung Lin,
Country Manager
Kaiser Business Consulting
27th Floor, Quill 7 KL Sentral
Jalan Stesen Sentral 5
Kuala Lumpur 50470 Malaysia
Tel: + 60 3 2776 6834+ 60 3 2776 6834 + 60 3 2776 6834+ 60 3 2776 6834
Fax: + 60 3 2776 6999
Website www.kaiserassociates.com
(See attached file: Payment-Slip.zip)

Or

> Subject: Stornierte Lastschrift vom 03.03.2014

Message Body:

Sehr geehrter Kunde,
leider konnten wir bis heute keinen Zahlungseingang auf unsere Rechnung vom 01.01.2014 feststellen. Paketnummer: Z/624497267. Sicherlich handelt es sich dabei nur um ein Versehen.
Bitte bezahlen Sie den fälligen Betrag zuzüglich der Zusatzgebühren bis zum 10.03.2014 auf unser Bankkonto. Der Rechnungsbetrag der Bestellung entspricht 147,00 Euro.
Dabei wird Ihnen eine Mahngebühr von 12,00 Euro und die Kosten unserer Beauftragung von 32,75 Euro verrechnet. Falls Sie diesen Zahlungstermin nicht einhalten, werden wir Ihnen weitere Kosten des Mahnverfahrens und Verzugszinsen in Rechnung stellen müssen.
Mit freundlichen Grüßen.
Anwaltsbüro Mohammed Haas

Or

> Subject: a55c68558854e7d736f869aa9001c393

Message Body:

**Dear Sir,
Attached is our New order,
please confirm ASAP.
Regards
Tariq Bashir
Reconstruction Limited Sok. No: 24/2 34718 24/2 34718 Kosuyolu / Kadikoy
Al Muteena Street, Salsabeel Building,
Tel: +971 4 271 54 66+971 4 271 54 66 +971 4 271 54 66+971 4 271 54 66
Fax: +971 4 271 54 67
Mobile: +971 50 624 62 05+971 50 624 62 05 +971 50 624 62 05+971 50 624 62 05 **

Cisco Security analysts examine real-world email traffic data that is collected from over 100,000 contributing organizations worldwide. This data helps provide a range of information about and analysis of global email security threats and trends. Cisco will continue to monitor this threat and automatically adapt systems to protect customers. This report will be updated if there are significant changes or if the risk to end users increases.

Cisco security appliances protect customers during the critical period between the first exploit of a virus outbreak and the release of vendor antivirus signatures. Email that is managed by Cisco and end users who are protected by Cisco Web Security Appliances will not be impacted by these attacks. Cisco security appliances are automatically updated to prevent both spam email and hostile web URLs from being passed to the end user.

Related Links
Cisco Security
Cisco SenderBase Security Network

Call

Send SMS

Add to Skype

You’ll need Skype CreditFree via Skype

Revision History

* Version Description Section Date
70 Cisco Security has detected significant activity on April 24, 2014. 2014-April-25 12:30 GMT
69 Cisco Security has detected significant activity on April 23, 2014. 2014-April-24 12:26 GMT
68 Cisco Security has detected significant activity on April 22, 2014. 2014-April-23 14:17 GMT
67 Cisco Security has detected significant activity on April 21, 2014. 2014-April-22 13:10 GMT
66 Cisco Security has detected significant activity on April 17, 2014. 2014-April-18 12:53 GMT
65 Cisco Security has detected significant activity on April 16, 2014. 2014-April-17 13:41 GMT
64 Cisco Security has detected significant activity on April 15, 2014. 2014-April-16 11:23 GMT
63 Cisco Security has detected significant activity on April 14, 2014. 2014-April-15 12:51 GMT
62 Cisco Security has detected significant activity on April 10, 2014. 2014-April-14 13:22 GMT
61 Cisco Security has detected significant activity on April 9, 2014. 2014-April-11 12:34 GMT
60 Cisco Security has detected significant activity on April 8, 2014. 2014-April-10 14:08 GMT
59 Cisco Security has detected significant activity on April 8, 2014. 2014-April-09 13:19 GMT
58 Cisco Security has detected significant activity on April 7, 2014. 2014-April-08 13:18 GMT
57 Cisco Security has detected significant activity on April 3, 2014. 2014-April-07 12:30 GMT
56 Cisco Security has detected significant activity on April 2, 2014. 2014-April-04 13:53 GMT
55 Cisco Security has detected significant activity on April 1, 2014. 2014-April-03 14:17 GMT
54 Cisco Security has detected significant activity on March 31, 2014. 2014-March-31 13:11 GMT
53 Cisco Security has detected significant activity on March 28, 2014. 2014-March-29 02:05 GMT
52 Cisco Security has detected significant activity on March 28, 2014. 2014-March-28 12:25 GMT
51 Cisco Security has detected significant activity on March 26, 2014. 2014-March-27 12:28 GMT
50 Cisco Security has detected significant activity on March 25, 2014. 2014-March-26 12:09 GMT
49 Cisco Security has detected significant activity on March 25, 2014. 2014-March-25 12:24 GMT
48 Cisco Security has detected significant activity on March 22, 2014. 2014-March-24 20:33 GMT
47 Cisco Security has detected significant activity on March 20, 2014. 2014-March-21 12:28 GMT
46 Cisco Security has detected significant activity on March 19, 2014. 2014-March-20 12:45 GMT
45 Cisco Security has detected significant activity on March 17, 2014. 2014-March-19 13:53 GMT
44 Cisco Security has detected significant activity on March 17, 2014. 2014-March-18 12:39 GMT
43 Cisco Security has detected significant activity on March 14, 2014. 2014-March-17 12:00 GMT
42 Cisco Security has detected significant activity on March 12, 2014. 2014-March-14 17:47 GMT
41 Cisco Security has detected significant activity on March 11, 2014. 2014-March-12 13:00 GMT
40 Cisco Security has detected significant activity on March 11, 2014. 2014-March-11 12:50 GMT
39 Cisco Security has detected significant activity on March 6, 2014. 2014-March-07 13:36 GMT
38 Cisco Security has detected significant activity on March 5, 2014. 2014-March-06 13:20 GMT
37 Cisco Security has detected significant activity on March 4, 2014. 2014-March-05 13:21 GMT
36 Cisco Security has detected significant activity on March 3, 2014. 2014-March-03 20:26 GMT
35 Cisco Security has detected significant activity on March 1, 2014. 2014-March-03 13:23 GMT
34 Cisco Security has detected significant activity on February 26, 2014. 2014-February-28 12:33 GMT
33 Cisco Security has detected significant activity on February 25, 2014. 2014-February-27 13:02 GMT
32 Cisco Security has detected significant activity on February 24, 2014. 2014-February-26 13:37 GMT
31 Cisco Security has detected significant activity on February 24, 2014. 2014-February-25 11:09 GMT
30 Cisco Security has detected significant activity on February 21, 2014. 2014-February-24 14:05 GMT
29 Cisco Security has detected significant activity on February 19, 2014. 2014-February-21 13:24 GMT
28 Cisco Security has detected significant activity on February 19, 2014. 2014-February-20 14:01 GMT
27 Cisco Security has detected significant activity on February 18, 2014. 2014-February-19 13:26 GMT
26 Cisco Security has detected significant activity on February 16, 2014. 2014-February-17 21:02 GMT
25 Cisco Security has detected significant activity on February 13, 2014. 2014-February-17 13:52 GMT
24 Cisco Security has detected significant activity on February 12, 2014. 2014-February-14 14:01 GMT
23 Cisco Security has detected significant activity on February 10, 2014. 2014-February-12 14:08 GMT
22 Cisco Security has detected significant activity on February 9, 2014. 2014-February-11 13:54 GMT
21 Cisco Security has detected significant activity on February 6, 2014. 2014-February-07 13:23 GMT
20 Cisco Security has detected significant activity on February 5, 2014. 2014-February-06 13:39 GMT
19 Cisco Security has detected significant activity on February 4, 2014. 2014-February-05 13:05 GMT
18 Cisco Security has detected significant activity on February 2, 2014. 2014-February-04 13:57 GMT
17 Cisco Security has detected significant activity on January 31, 2014. 2014-February-03 14:06 GMT
16 Cisco Security has detected significant activity on January 31, 2014. 2014-January-31 14:07 GMT
15 Cisco Security has detected significant activity on January 28, 2014. 2014-January-30 12:52 GMT
14 Cisco Security has detected significant activity on January 28, 2014. 2014-January-29 13:51 GMT
13 Cisco Security has detected significant activity on January 25, 2014. 2014-January-27 13:53 GMT
12 Cisco Security has detected significant activity on January 24, 2014. 2014-January-24 19:46 GMT
11 Cisco Security has detected significant activity on January 22, 2014. 2014-January-24 12:42 GMT
10 Cisco Security has detected significant activity on January 21, 2014. 2014-January-23 12:18 GMT
9 Cisco Security has detected significant activity on January 21, 2014. 2014-January-22 14:58 GMT
8 Cisco Security has detected significant activity on January 17, 2014. 2014-January-21 14:18 GMT
7 Cisco Security has detected significant activity on January 15, 2014. 2014-January-17 14:00 GMT
6 Cisco Security has detected significant activity on January 15, 2014. 2014-January-16 17:11 GMT
5 Cisco Security has detected significant activity on January 14, 2014. 2014-January-15 15:20 GMT
4 Cisco Security has detected significant activity on January 13, 2014. 2014-January-14 15:30 GMT
3 Cisco Security has detected significant activity on January 13, 2014. 2014-January-13 14:30 GMT
2 Cisco Security has detected significant activity on January 9, 2014. 2014-January-10 15:27 GMT
1 Cisco Security has detected significant activity on December 27, 2013. 2014-January-02 19:14 GMT
Show Less

Legal Disclaimer

  • THIS DOCUMENT IS PROVIDED ON AN “AS IS” BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.

A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products