Analysis
-
max time kernel
150s -
max time network
146s -
platform
macos-10.15_amd64 -
resource
macos-20240214-en -
resource tags
arch:amd64arch:i386image:macos-20240214-enkernel:19b77alocale:en-usos:macos-10.15-amd64system -
submitted
15-02-2024 04:38
Behavioral task
behavioral1
Sample
2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest
Resource
macos-20240214-en
General
-
Target
2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest
-
Size
10.7MB
-
MD5
4e272ae307509135d27776bd4c5b8147
-
SHA1
c8b7c5e84fd7e05fccb1d9a99b91f27d0c683b23
-
SHA256
d4a9afb55a07d94d43d1d887db17f043e038d239f762ae590a2c1ed97200d891
-
SHA512
5878ceac29a06eab180d80af4ba36c07ef761a071f89df5d6caa0c926ed75e67fbe00472c286d4ba487e01b231a693a15786655de615b923aabb535e574e5672
-
SSDEEP
49152:U33dQ333dQ333dQ333dQ3C33d/33dQ333dQ333dQ333dQ3C33d/33dQ333dQ333q:j
Malware Config
Signatures
-
EvilQuest payload 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x000000030008af1e-4.dat family_evilquest behavioral1/files/0x000000030008af1b-3.dat family_evilquest behavioral1/files/0x000000030008af1b-7.dat family_evilquest behavioral1/files/0x000000030008af29-8.dat family_evilquest -
Launch Daemon 1 TTPs
-
AppleScript 1 TTPs 34 IoCs
Processes:
ioc Process osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "beep 18 say \"Your files are encrypted\" waiting until completion false set alTitle to \"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\" set alText to \"Your files are encrypted\" display alert alText message alTitle as critical buttons {\"OK\"} set the clipboard to \"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" osascript -e "beep 18 say \"Your files are encrypted\" waiting until completion false set alTitle to \"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\" set alText to \"Your files are encrypted\" display alert alText message alTitle as critical buttons {\"OK\"} set the clipboard to \"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\"" osascript -e "beep 18 say \"Your files are encrypted\" waiting until completion false set alTitle to \"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\" set alText to \"Your files are encrypted\" display alert alText message alTitle as critical buttons {\"OK\"} set the clipboard to \"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\"" -
Resource Forking 1 TTPs 2 IoCs
Processes:
ioc Process /System/Library/Frameworks/ApplicationServices.framework/Frameworks/SpeechSynthesis.framework/Resources/com.apple.speech.speechsynthesisd /System/Library/Frameworks/ApplicationServices.framework/Frameworks/SpeechSynthesis.framework/Resources/com.apple.speech.speechsynthesisd -
Launchctl 1 TTPs 64 IoCs
Processes:
ioc Process osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist launchctl start questd sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" launchctl start questd launchctl start questd sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" launchctl start questd launchctl start questd osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist launchctl start questd /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" launchctl start questd osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" launchctl start questd launchctl start questd /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" launchctl start questd osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist launchctl start questd sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist launchctl start questd sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" sh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\"" osascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges" /bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd" launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist launchctl start questd
Processes
-
/bin/shsh -c "sudo /bin/zsh -c \"/Users/run/2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest\""1⤵PID:525
-
/bin/bashsh -c "sudo /bin/zsh -c \"/Users/run/2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest\""1⤵PID:525
-
/usr/bin/sudosudo /bin/zsh -c /Users/run/2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest1⤵PID:525
-
/bin/zsh/bin/zsh -c /Users/run/2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest2⤵PID:527
-
-
/Users/run/2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest/Users/run/2024-02-15_4e272ae307509135d27776bd4c5b8147_adload_evilquest2⤵PID:527
-
-
/usr/libexec/dmd/usr/libexec/dmd1⤵PID:517
-
/usr/libexec/xpcproxyxpcproxy com.apple.sysmond1⤵PID:529
-
/usr/libexec/sysmond/usr/libexec/sysmond1⤵PID:529
-
/usr/libexec/xpcproxyxpcproxy com.apple.secinitd1⤵PID:549
-
/usr/libexec/secinitd/usr/libexec/secinitd1⤵PID:549
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:551
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:551
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:551
-
/usr/libexec/xpcproxyxpcproxy com.apple.security.authtrampoline1⤵PID:552
-
/System/Library/Frameworks/Security.framework/authtrampoline/System/Library/Frameworks/Security.framework/authtrampoline1⤵PID:552
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:553
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:553
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:554
-
-
/bin/launchctllaunchctl start questd2⤵PID:556
-
-
/usr/libexec/xpcproxyxpcproxy questd1⤵PID:555
-
/usr/bin/sudosudo /Library/AppQuest/com.apple.questd --silent1⤵PID:555
-
/Library/AppQuest/com.apple.questd/Library/AppQuest/com.apple.questd --silent2⤵PID:565
-
-
/var/root/Hellper.app2⤵PID:565
-
-
/var/root/Hellper.app2⤵PID:565
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:557
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:557
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:557
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:558
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:558
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:559
-
-
/bin/launchctllaunchctl start questd2⤵PID:560
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:561
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:561
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:561
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:562
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:562
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:563
-
-
/bin/launchctllaunchctl start questd2⤵PID:564
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:566
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:566
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:566
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:567
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:567
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:568
-
-
/bin/launchctllaunchctl start questd2⤵PID:569
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:570
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:570
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:570
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:571
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:571
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:572
-
-
/bin/launchctllaunchctl start questd2⤵PID:573
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:574
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:574
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:574
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:575
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:575
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:575
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:576
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:576
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:577
-
-
/bin/launchctllaunchctl start questd2⤵PID:578
-
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:579
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:579
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:580
-
-
/bin/launchctllaunchctl start questd2⤵PID:581
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:583
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:583
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:583
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:584
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:584
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:585
-
-
/bin/launchctllaunchctl start questd2⤵PID:586
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:587
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:587
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:587
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:591
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:591
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:592
-
-
/bin/launchctllaunchctl start questd2⤵PID:593
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:594
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:594
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:594
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:595
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:595
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:596
-
-
/bin/launchctllaunchctl start questd2⤵PID:597
-
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:598
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:598
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:598
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:599
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:599
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:600
-
-
/bin/launchctllaunchctl start questd2⤵PID:601
-
-
/usr/sbin/spctl/usr/sbin/spctl --assess --type execute /Applications/OneDrive.app1⤵PID:602
-
/usr/libexec/xpcproxyxpcproxy com.apple.assistantd1⤵PID:604
-
/usr/libexec/xpcproxyxpcproxy com.apple.bird1⤵PID:605
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:607
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:607
-
/usr/libexec/xpcproxyxpcproxy com.apple.pbs1⤵PID:608
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:609
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:609
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:610
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:610
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:613
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:613
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:614
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:614
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:615
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:615
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:618
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:618
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:618
-
/System/Library/PrivateFrameworks/AssistantServices.framework/Versions/A/Support/assistantd/System/Library/PrivateFrameworks/AssistantServices.framework/Versions/A/Support/assistantd1⤵PID:604
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:619
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:619
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:620
-
-
/bin/launchctllaunchctl start questd2⤵PID:621
-
-
/System/Library/CoreServices/pbs/System/Library/CoreServices/pbs1⤵PID:608
-
/System/Library/PrivateFrameworks/CloudDocsDaemon.framework/Versions/A/Support/bird/System/Library/PrivateFrameworks/CloudDocsDaemon.framework/Versions/A/Support/bird1⤵PID:605
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:623
-
/usr/libexec/xpcproxyxpcproxy com.apple.nehelper1⤵PID:626
-
/usr/libexec/nehelper/usr/libexec/nehelper1⤵PID:626
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:623
-
/bin/launchctl/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon1⤵PID:627
-
/bin/launchctl/bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon1⤵PID:628
-
/bin/shsh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\""1⤵PID:632
-
/bin/bashsh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\""1⤵PID:632
-
/usr/bin/osascriptosascript -e "beep 18 say \"Your files are encrypted\" waiting until completion false set alTitle to \"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\" set alText to \"Your files are encrypted\" display alert alText message alTitle as critical buttons {\"OK\"} set the clipboard to \"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\""1⤵PID:632
-
/usr/libexec/xpcproxyxpcproxy com.apple.audio.systemsoundserverd1⤵PID:633
-
/usr/sbin/systemsoundserverd/usr/sbin/systemsoundserverd1⤵PID:633
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:634
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:634
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:634
-
/usr/libexec/xpcproxyxpcproxy com.apple.audio.AudioComponentRegistrar1⤵PID:635
-
/System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar/System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar -daemon1⤵PID:635
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:638
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:638
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:639
-
-
/bin/launchctllaunchctl start questd2⤵PID:640
-
-
/usr/libexec/xpcproxyxpcproxy com.apple.speech.speechsynthesisd1⤵PID:645
-
/System/Library/Frameworks/ApplicationServices.framework/Frameworks/SpeechSynthesis.framework/Resources/com.apple.speech.speechsynthesisd/System/Library/Frameworks/ApplicationServices.framework/Frameworks/SpeechSynthesis.framework/Resources/com.apple.speech.speechsynthesisd1⤵PID:645
-
/usr/libexec/xpcproxyxpcproxy com.apple.audio.SandboxHelper 6451⤵PID:646
-
/System/Library/Frameworks/AudioToolbox.framework/XPCServices/com.apple.audio.SandboxHelper.xpc/Contents/MacOS/com.apple.audio.SandboxHelper/System/Library/Frameworks/AudioToolbox.framework/XPCServices/com.apple.audio.SandboxHelper.xpc/Contents/MacOS/com.apple.audio.SandboxHelper1⤵PID:646
-
/usr/libexec/xpcproxyxpcproxy com.apple.ViewBridgeAuxiliary1⤵PID:648
-
/System/Library/PrivateFrameworks/ViewBridge.framework/Versions/A/XPCServices/ViewBridgeAuxiliary.xpc/Contents/MacOS/ViewBridgeAuxiliary/System/Library/PrivateFrameworks/ViewBridge.framework/Versions/A/XPCServices/ViewBridgeAuxiliary.xpc/Contents/MacOS/ViewBridgeAuxiliary1⤵PID:648
-
/bin/shsh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\""1⤵PID:649
-
/bin/bashsh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\""1⤵PID:649
-
/usr/bin/osascriptosascript -e "beep 18 say \"Your files are encrypted\" waiting until completion false set alTitle to \"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\" set alText to \"Your files are encrypted\" display alert alText message alTitle as critical buttons {\"OK\"} set the clipboard to \"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\""1⤵PID:649
-
/usr/libexec/xpcproxyxpcproxy com.apple.security.agent1⤵PID:650
-
/System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle/Contents/MacOS/SecurityAgent/System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle/Contents/MacOS/SecurityAgent1⤵PID:650
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:651
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:651
-
/usr/libexec/xpcproxyxpcproxy com.apple.speech.speechsynthesisd1⤵PID:670
-
/System/Library/Frameworks/ApplicationServices.framework/Frameworks/SpeechSynthesis.framework/Resources/com.apple.speech.speechsynthesisd/System/Library/Frameworks/ApplicationServices.framework/Frameworks/SpeechSynthesis.framework/Resources/com.apple.speech.speechsynthesisd1⤵PID:670
-
/usr/libexec/xpcproxyxpcproxy com.apple.audio.SandboxHelper 6701⤵PID:671
-
/System/Library/Frameworks/AudioToolbox.framework/XPCServices/com.apple.audio.SandboxHelper.xpc/Contents/MacOS/com.apple.audio.SandboxHelper/System/Library/Frameworks/AudioToolbox.framework/XPCServices/com.apple.audio.SandboxHelper.xpc/Contents/MacOS/com.apple.audio.SandboxHelper1⤵PID:671
-
/bin/shsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:678
-
/bin/bashsh -c "osascript -e \"do shell script \\\"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\\\" with administrator privileges\""1⤵PID:678
-
/usr/bin/osascriptosascript -e "do shell script \"launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd\" with administrator privileges"1⤵PID:678
-
/bin/sh/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:679
-
/bin/bash/bin/sh -c "launchctl load -w /Library/LaunchDaemons/com.apple.questd.plist;launchctl start questd"1⤵PID:679
-
/bin/launchctllaunchctl load -w /Library/LaunchDaemons/com.apple.questd.plist2⤵PID:680
-
-
/bin/launchctllaunchctl start questd2⤵PID:681
-
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:682
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:682
-
/bin/shsh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\""1⤵PID:688
-
/bin/bashsh -c "osascript -e \"beep 18 say \\\"Your files are encrypted\\\" waiting until completion false set alTitle to \\\"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\\\" set alText to \\\"Your files are encrypted\\\" display alert alText message alTitle as critical buttons {\\\"OK\\\"} set the clipboard to \\\"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\\\"\""1⤵PID:688
-
/usr/bin/osascriptosascript -e "beep 18 say \"Your files are encrypted\" waiting until completion false set alTitle to \"Many of your important documents, photos, videos, images and other files are no longer accessible because they have been encrypted. Maybe you are busy looking for a way to recover your files, but do not waste your time. Nobody can recover your files without our decryption service. We guarantee however that you can recover your files safely and easily and this will cost you 50 USD without any additional fees. Our offer is valid FOR 3 DAYS (starting now!). Full details can be found in the file: READ_ME_NOW.txt located on your Desktop\" set alText to \"Your files are encrypted\" display alert alText message alTitle as critical buttons {\"OK\"} set the clipboard to \"13roGMpWd7Pb3ZoJyce8eoQpfegQvGHHK7\""1⤵PID:688
-
/usr/libexec/xpcproxyxpcproxy com.apple.ReportCrash.Root1⤵PID:710
-
/System/Library/CoreServices/ReportCrash/System/Library/CoreServices/ReportCrash daemon1⤵PID:710
-
/usr/libexec/xpcproxyxpcproxy com.apple.accountsd1⤵PID:711
-
/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd/System/Library/Frameworks/Accounts.framework/Versions/A/Support/accountsd1⤵PID:711
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5ea19a6df0fc62dc761d2f9fae170c3b8
SHA122abcef071952b38ce6394decb3dcfd7a9ab747c
SHA256acf4bae8da4fb32e6d63af7a3f7c2a47490d98af966906ce32bbf8b6dc399df8
SHA5123401be5b7970cd38a12f05205e8a45b4932e29fa5134202ac375fb1c497835673649e879a2a663e2a044aadf3af72f072cb88aa2b94879a09ffea205e0316faf
-
Filesize
2.8MB
MD56e613db64a212465eedefdd39b2a43ad
SHA11cbcf1d26772527a05e28adfb11f009e7c5f7571
SHA2560977db4f87a6484ab91926ea6a29f37a1c6f1d06394b023cdc877056ab7ab823
SHA512786bfd3df22fec653c4a198f3f6a583af078c3d27fad33e5f835711215b32cc5c8ea473e3a2237955c6b62deab61e713660fffa7b27458e9d3126dc4b6705c6f
-
Filesize
435B
MD5a3d34532a7dd2cd1d73cea75deb0677f
SHA13019d1c50907fb2597121c03619990c5670ff6f4
SHA256779a31e4de99f9de28de8bf064c504382e050c114e2e865cc1f694c7e6339735
SHA51252618a5f14247c909a3857b122a124d0ddd00890c128cf041976182423b3d728cab11daf5b6a1adb6845d062b54083e72380184b6f76369482305c2782bedd91
-
Filesize
355B
MD5a6ef4856e99c9d8e1d9bb762c5a8503a
SHA125d5405ad91791b716ae5a56b37aa2b393854967
SHA256232441aa129d4f21999860b8bf31db4b8617df9f7d32ef5f25a383edff82d9fa
SHA512582fa1ea60766a5a4e99b295a8ed98c94f6bab45e42b7e8db61e9ad645f531891082cd457bfd11d660195af86f02c4ed93589e6e6daded683cff2d8319bbc489
-
Filesize
314B
MD5b3da4865f8c9f468ed99fd1245bef99b
SHA1d2892ec7546ec5b5eef7ec399119bdc8045675cc
SHA2566d5819c601e1ba82e68d4e45828315cde4ec71f0980a94c0d4b151995f2cdff7
SHA512f77ce6110595b72095ebe746ff3a3fca70cc5093b42e61f681678f1888ecfc975fa25209a7cb6fb74fb41b49d3e3f0ed9cdabdb041fec12c09cc73fe60ac65ad
-
Filesize
2.4MB
MD542c4569bd28740dc813d89d3fe10c036
SHA1deb681b2b291d428cd689bcd15fa4bd8c43746e4
SHA2565246a65f19bbb3a78a26ea467b654cfed0c077d4efe7147364c425bcdb1b9c12
SHA51294174e6e955e812a8272d33f9fad610628b8f78635602d2b48a1e8ea85d04a1c8559f6416941f77b36cde4cc2dba6e4e41f469aaf0ebb2a7c0275e462505a503
-
Filesize
102KB
MD5d5fd8f52121a419433c70a33e1d28bca
SHA17f81179c29de2167929a879f3792e4c9c8cb827b
SHA2569812449f33a0a773000b48424d6845dcb9592aeec43a6e3a3d09d7d820c3f7b1
SHA512bb9be788142cda9ec28eca4e8046343721e8b1fbf943ca875525f4ecee0cee660cefd7f0e9a49049f2f5a10a2adf8244a577c799978d7dff989c135e9d98da0e
-
Filesize
423B
MD5eb73619f4e724257ff0fd951883a30ae
SHA15032251e50b32e340d8171631a598596bad8991e
SHA2566e56467f3f5502588094c91e2d58bbb1e43c4e8171093db14931dd41788e17d4
SHA512ec95c395414181bc77c7a2980fbd3fe69b718aa98c878e514c3f28b738e1669488126cbdfa96e3a182afd8536b54bc1791a044fa3535d1fd3fad54dfda337b7c
-
Filesize
47KB
MD50e4a0d1ceb2af6f0f8d0167ce77be2d3
SHA1414ba4c1dc5fc8bf53d550e296fd6f5ad669918c
SHA256cca093bcfc65e25dd77c849866e110df72526dffbe29d76e11e29c7d888a4030
SHA5121dc5282d27c49a4b6f921ba5dfc88b8c1d32289df00dd866f9ac6669a5a8d99afeda614bffc7cf61a44375ae73e09cd52606b443b63636977c9cd2ef4fa68a20
-
Filesize
4KB
MD5d3a1859e6ec593505cc882e6def48fc8
SHA1f8e6728e3e9de477a75706faa95cead9ce13cb32
SHA2563ebafa97782204a4a1d75cfec22e15fcdeab45b65bab3b3e65508707e034a16c
SHA512ea2a749b105759ea33408186b417359deffb4a3a5ed0533cb26b459c16bb3524d67ede5c9cf0d5098921c0c0a9313fb9c2672f1e5ba48810eda548fa3209e818
-
Filesize
1.9MB
MD59a8474f3f33e0ce9de013079299d6e32
SHA1c7cb62b5fbd519caa44c31d11fac1c6a679fd3e0
SHA2567b3a6a77f1be13da2b0433b8f517636a6928d5c144797b93e365173fd58244a3
SHA512e86e9a6c030436990c56ba9ec6252be9c3e23fb1f31a23c48b0860400e1b16185b407f0ea91c19ee30dff0734025aafe63129db14f1646f976bf3817a87e2a95
-
Filesize
422B
MD570c1e05ff6b32db6e1ef873321abd1f9
SHA116878e40cd5a569bc8f441988cc07b66ffc8534a
SHA256ba60feb2a639cd847674e6599cabf986ede7876231a292785b0365d58b7b9378
SHA5121e82629b3b1fa7bb88e7efe0393aee7114631555fbfe614d33b9b1efb4d299c35dac5e393f834dcc26a5e192e46e317124c0b841f65ab371819c34802424712e
-
Filesize
288B
MD528145801b1e7c48ee3ed31025ec694c7
SHA1c883cc180cfff8266e6b0201d6cea06c0b4a6ac0
SHA25601a7e3d1e879a1669b91a9e51fceb12962a1da71b62ecc8b5f369c737f3b9bd1
SHA5129b911f717d478bce52dde75fc9f701f7db77c6370bb79e871e51fc57e602483ef02ec51dcd85258ec9f9d9ed5ac3f1cbc1c34a60bb579109f267f8a8b9c668b8