You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

MALWARE access via hole in Browser Plugin Process. Applications achieving root level authorization. Please help.

MACBOOK PRO. Late 2011. LION 10.7.3 - 2.2GHz w/4GB 1333 MHz DDR3. Wifi for Internet at home and BlueTooth for the mouse. No iChat, iTunes, iCalendar etc.


I have recently experienced what appears to be a complete collapse of the security protocol and my system now seems to be run by foreign programs. I will quickly describe what I have discovered and what I think could be the cause. I will then post some of the files I found as well as some logs. Please let me know your thoughts, what other information you need and what I can do to remedy the situation. I don't want to debate the existance of threats. I am willing to accept reasonable explanations but please look at everything I am asking for help with. Thank you in advance for thoughtful replies.


Background

On or about March 22 I updated Quicktime/Safari to be able to view and play rich media. I installed the Perian, Flip4Mac and DIVX plugins. I had run into problems with homepage hijackers previouslyI did not notice anything suspicious until this weekend. The system slowed to a halt after visiting sites like YouTube, DailyMotion etc. The system started generating comprehensive debugging reports and failed to shut down properly. The boot logs changed as well. Some went missing (no data reported) and the protocols for others changed dramatically. New applications began to show up in the Activity Monitor and new components began to appear with unknown origins or authors.

Current State - Login


It appears as though the security protocol has changed. PAM framework exposes a generic set of API/functions to the applications. Applications simply call the functions de- fined in the module passing in the credentials of the user. Secure logs, crash reports and DEBUGGING logs all indicate that there is a breakdown in the system allowing something to get set up as a guest user without a urlAttribute or homeDirPath or the proper syntax and is reestablishing itself on start using exception handling protocols and cached data. It is refusing to let go when shutting down and starts up again before any other systems are in place from its persistant state cache.


Current State - Files, Logs and Caches


The private/tmp folder have seen new locked files and folders appear at the same time. All of which point back to Safari/Fireworks Plugin Process as its origin. File contents posted below


eka_named_mutex_KLAVA (zero bytes on disk)

PRCustomProps

PRObjects

wnstat.xml

launchd-142.RTSwZ4 (locked folder)


eka_named_mutex_KLAVA


PRCustomProps =

!! ?PR_REMOTE_MANAGER_PROP ?cpnPRAGUE_REMOTE_API ?cpTASK_MANAGER_TASK_ID ?

cpTASK_MANAGER_TASK_IS_REMOTE ?npISWIFT_MODE ?npISWIFT_VOLUME_ID ?npISWIFT_FILE_ID

?npAVS_HTTP_REQ ?

npAVS_HTTP_RSP ?

npAVS_SCAN_ACTION_NAME

?npAVS_CHAINED_OBJECT ?KTT ?npSCAN_OBJECT_CONTEXT ?

npENGINE_OBJECT_PARAM_ACTION_CLASS_MASK_tDWORD ?npENGINE_VIRTUAL_OBJECT_NAME ?npENGINE_OBJECT_DETECT_STATE ?npENGINE_OBJECT_READONLY_tERROR ?

npENGINE_OBJECT_READONLY_hOBJECT ?npENGINE_OBJECT_SESSION_hOBJECT ?

npENGINE_OBJECT_SKIP_THIS_ONE_tBOOL ?npENGINE_OBJECT_EXECUTABLE_PARENT_IO_hOBJECT ?npENGINE_OBJECT_SET_WRITE_ACCESS_tERROR ?propid_reopen_user_data ?

npENGINE_INTEGRAL_PARENT_IO ?propid_istreams_ctx ?npSCAN_OBJECT_BCKFLAG ?

avp1_has_special_cure ?cpTEMPFILE_MEMMANAGER ?npOBJECT_STARTUP ?DEFER_THREAD_INIT



wnstat.xml file contents =

<propertiesmap>


<key name="WebNetStat">


<key name="Zones">


<key name="0000">


<tSTRING name="Name">test</tSTRING>


</key>


<key name="0001">


<tSTRING name="Name">ac</tSTRING>


</key>


<key name="0002">


<tSTRING name="Name">ad</tSTRING>


</key>


<key name="0003">


<tSTRING name="Name">ae</tSTRING>


</key>


....all the way through to...



<key name="0274">


<tSTRING name="Name">xxx</tSTRING>


</key>

</key>


<tBOOL name="SkipUnknown">1</tBOOL>


<key name="WaitTimeouts">


<key name="0000">


<tBYTE name="Id">2</tBYTE>


<tDWORD name="Timeout">2000</tDWORD>


</key>


</key>


</key>

</propertiesmap>


PRObjects = 8Lä± PRRoot 8TD± TaskManager



New Processes have appeared in the Activity Monitor that all link together to manage what happens and what gets reported. They include


backgroundinstruments -

/Applications/Xcode.app/Contents/Library/LoginItems

->0xffffff800e8af648

/Applications/Xcode.app/Contents/Library

/Applications/Xcode.app/Contents

/Applications/Xcode.app

/Applications

count=0, state=0x1

count=0, state=0x1


imagent

/

/System/Library/PrivateFrameworks/IMCore.framework/imagent.app/Contents/MacOS/im agent

/System/Library/PrivateFrameworks/IMCore.framework/Versions/A/Frameworks/IMDaemo nCore.framework/Versions/A/IMDaemonCore

/System/Library/Frameworks/IMServicePlugIn.framework/Versions/A/IMServicePlugIn

/private/var/db/mds/messages/se_SecurityMessages

/usr/share/icu/icudt46l.dat

/usr/lib/dyld

/private/var/db/dyld/dyld_shared_cache_x86_64

/dev/null

->0xffffff800d7573f0

->0xffffff800d7573f0

count=1, state=0x2

->0xffffff800e8aea90


com.apple.legacymediabridge.videodecompressionserver


This one is the most troubling. I understand that Quicktime can read and or write code from an embedded XML file. I have noticed all sorts of new Components listed in System Information that relate directly to the collection, distribution and execution of code via the browser plugin process. It wouldn't take much to inject code into a cache that can be later executed by processes that have hijacked the login protocol. With two way conversation back and forth it could easily be tweaked based on DEBUGGING reports sent home until it has been proven effective.


I think my machine has been compromised before. I reported some incidents last fall however I didn't know enough about OSX to gage the threat. My experience before and after visiting certain media sites is the same except this time they seem to be far more effective.


Please let me know what you think the best remedy might be. I want to eliminate all of the errors, get the system running as it should and ultimately put up some kind of barrier that isn't so easy to foil. I just received another error


"12-04-08 2:33:13.267 AM helpd: CFPropertyListCreateFromXMLData(): Old-style plist parser: missing semicolon in dictionary.


I am suspicious because I have seen my system compromised by code embedded in Browser Plug In processes before. I am suspicious because what I have seen happen to my system over the last few days is consistent with how one might attack a OSX machine. Too many odd changes inconsistent with how others have described their experience. Let me know what else you need to help define things further. I can provide a lot more data about the contents of files recently modified, logs, debug reports etc. I am not sure where to start, what is important and what can be dismissed. I appreciate your help.

MacBook Pro, Mac OS X (10.7.2)

Posted on Apr 8, 2012 2:23 AM

Reply
35 replies

Apr 8, 2012 3:20 AM in response to MAC ATTACKED

Here is the latest boot log. DEBUG details the user event issues and describes updating and opening keychain prior to login authorization. Seems to be launching from disk01 while APPLE OSX is the main partition (disk02) and RECOVERY is disk03.


Apr 8 03:36:46 TJBs-MacBook-Pro shutdown[58855]: reboot by MASTER:

Apr 8 03:37:22 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Session 100000 created

Apr 8 03:37:26 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Entering service

Apr 8 03:37:26 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [11] for authorization created by '/usr/libexec/UserEventAgent' [11]

Apr 8 03:37:29 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Session 100005 created

Apr 8 03:37:29 TJBs-MacBook-Pro loginwindow[47]: Login Window Started Security Agent

Apr 8 03:37:29 TJBs-MacBook-Pro SecurityAgent[111]: Echo enabled

Apr 8 03:38:29 TJBs-MacBook-Pro SecurityAgent[111]: User info context values set for MASTER

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_authenticate(): Got user: MASTER

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_authenticate(): Got ruser: (null)

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_authenticate(): Got service: authorization

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in od_principal_for_user(): No authentication authority returned

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in od_principal_for_user(): failed: 7

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_authenticate(): Done cleanup3

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_authenticate(): Kerberos 5 refuses you

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm

Apr 8 03:38:29 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in od_record_check_pwpolicy(): retval: 0

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Establishing credentials

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Got user: MASTER

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Context initialised

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Got euid, egid: 0 0

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Done getpwnam()

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Done setegid() & seteuid()

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): pam_sm_setcred: krb5 user MASTER doesn't have a principal

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Done cleanup3

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Done seteuid() & setegid()

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): Done cleanup4

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): pam_sm_setcred: ntlm

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: in pam_sm_setcred(): pam_sm_setcred: no domain found skipping

Apr 8 03:38:30 TJBs-MacBook-Pro SecurityAgent[111]: Login Window login proceeding

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | name = MASTER, path = /Users/MASTER, homeLoc = (null)

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter setNeedsToUnmountDirVolumeAtLogout:] | mounter calling mechanism to setNeedsToUnmountDirVolumeAtLogout to 0

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | urlAttribute = null

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | homeDirPath did NOT follow a symlink, keeping original path of: /Users/MASTER

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | homeDirMajorType = 1

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter mountStandardDirectoryForUser:atPath:attributes:] | name = MASTER, path = /Users/MASTER, homeLoc = (null)

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMechanism isGuestAccount] | enter

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMechanism isGuestAccount] | Guest account check returning 0

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter setHomeDirType:] | setHomeDirType to 1

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter mountStandardDirectoryForUser:atPath:attributes:] | returning 0

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | returning 0

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMechanism invoke] | mountHomeDirectoryForUser returns 0

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMechanism updateAndUnlockKeychain] | updateAndUnlockKeychain

Apr 8 03:38:30 TJBs-MacBook-Pro authorizationhost[137]: DEBUGLOG | -[HomeDirMechanism launchHomeDirFixerToolIfNeeded:] | launchHomeDirFixerToolIfNeeded called with 0

Apr 8 03:38:31 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Succeeded authorizing right 'system.login.console' by client '/System/Library/CoreServices/loginwindow.app' [47] for authorization created by '/System/Library/CoreServices/loginwindow.app' [47]

Apr 8 03:38:31 TJBs-MacBook-Pro loginwindow[47]: Login Window - Returned from Security Agent

Apr 8 03:38:32 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Succeeded authorizing right 'system.login.done' by client '/System/Library/CoreServices/loginwindow.app' [47] for authorization created by '/System/Library/CoreServices/loginwindow.app' [47]

Apr 8 03:43:52 TJBs-MacBook-Pro shutdown[228]: reboot by MASTER:

Apr 8 03:44:24 localhost com.apple.SecurityServer[23]: Session 100000 created

Apr 8 03:44:31 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Entering service

Apr 8 03:44:31 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Succeeded authorizing right 'com.apple.ServiceManagement.daemons.modify' by client '/usr/libexec/UserEventAgent' [11] for authorization created by '/usr/libexec/UserEventAgent' [11]

Apr 8 03:44:35 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Session 100005 created

Apr 8 03:44:35 TJBs-MacBook-Pro loginwindow[47]: Login Window Started Security Agent

Apr 8 03:44:36 TJBs-MacBook-Pro SecurityAgent[111]: Echo enabled

Apr 8 03:44:52 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Engine::authorize: Rule::evaluate returned 4294907288 returning errAuthorizationInternal

Apr 8 03:44:52 TJBs-MacBook-Pro loginwindow[47]: Login Window - Returned from Security Agent

Apr 8 03:44:52 TJBs-MacBook-Pro loginwindow[47]: AuthorizationRef doesn't have a username (<LoginAuthRefMgr: 0x100d36720>). Exiting.

Apr 8 03:44:53 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Session 100009 created

Apr 8 03:44:53 TJBs-MacBook-Pro loginwindow[128]: Login Window Started Security Agent

Apr 8 03:44:53 TJBs-MacBook-Pro SecurityAgent[141]: Echo enabled

Apr 8 03:45:27 TJBs-MacBook-Pro SecurityAgent[141]: User info context values set for MASTER

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_authenticate(): Got user: MASTER

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_authenticate(): Got ruser: (null)

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_authenticate(): Got service: authorization

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in od_principal_for_user(): No authentication authority returned

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in od_principal_for_user(): failed: 7

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_authenticate(): Failed to determine Kerberos principal name.

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_authenticate(): Done cleanup3

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_authenticate(): Kerberos 5 refuses you

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_authenticate(): pam_sm_authenticate: ntlm

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_acct_mgmt(): OpenDirectory - Membership cache TTL set to 1800.

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in od_record_check_pwpolicy(): retval: 0

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in od_record_attribute_create_cfstring(): returned 2 attributes for dsAttrTypeStandard:AuthenticationAuthority

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Establishing credentials

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Got user: MASTER

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Context initialised

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Got euid, egid: 0 0

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Done getpwnam()

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Done setegid() & seteuid()

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): pam_sm_setcred: krb5 user MASTER doesn't have a principal

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Done cleanup3

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Done seteuid() & setegid()

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): Done cleanup4

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): pam_sm_setcred: ntlm

Apr 8 03:45:27 TJBs-MacBook-Pro authorizationhost[148]: in pam_sm_setcred(): pam_sm_setcred: no domain found skipping

Apr 8 03:45:28 TJBs-MacBook-Pro SecurityAgent[141]: Login Window login proceeding

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | name = MASTER, path = /Users/MASTER, homeLoc = (null)

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter setNeedsToUnmountDirVolumeAtLogout:] | mounter calling mechanism to setNeedsToUnmountDirVolumeAtLogout to 0

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | urlAttribute = null

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | homeDirPath did NOT follow a symlink, keeping original path of: /Users/MASTER

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | homeDirMajorType = 1

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter mountStandardDirectoryForUser:atPath:attributes:] | name = MASTER, path = /Users/MASTER, homeLoc = (null)

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMechanism isGuestAccount] | enter

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMechanism isGuestAccount] | Guest account check returning 0

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter setHomeDirType:] | setHomeDirType to 1

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter mountStandardDirectoryForUser:atPath:attributes:] | returning 0

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMounter mountHomeDirectoryForUser:atPath:homeLocation:] | returning 0

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMechanism invoke] | mountHomeDirectoryForUser returns 0

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMechanism updateAndUnlockKeychain] | updateAndUnlockKeychain

Apr 8 03:45:28 TJBs-MacBook-Pro authorizationhost[148]: DEBUGLOG | -[HomeDirMechanism launchHomeDirFixerToolIfNeeded:] | launchHomeDirFixerToolIfNeeded called with 0

Apr 8 03:45:29 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Succeeded authorizing right 'system.login.console' by client '/System/Library/CoreServices/loginwindow.app' [128] for authorization created by '/System/Library/CoreServices/loginwindow.app' [128]

Apr 8 03:45:29 TJBs-MacBook-Pro loginwindow[128]: Login Window - Returned from Security Agent

Apr 8 03:45:29 TJBs-MacBook-Pro com.apple.SecurityServer[23]: Succeeded authorizing right 'system.login.done' by client '/System/Library/CoreServices/loginwindow.app' [128] for authorization created by '/System/Library/CoreServices/loginwindow.app' [128]

Apr 8 03:45:30 TJBs-MacBook-Pro loginwindow[128]: ISGetIconFamilyFromStorage: seed mismatch for 231b0001, actual seed is 140e0f76

Apr 8 03:46:00: --- last message repeated 2 times ---







Here is the latest shutdown log. Usually it hangs a little if its a complete shutdown but it closed pretty fast due to reboot. Let me know if you need the whole report.


-94032 1 com.apple.launchd 1 com.apple.launchd System shutdown began

-94018 1 com.apple.launchd 1 com.apple.launchd System: Beginning job manager shutdown with flags: RB_AUTOBOOT

-93778 1 com.apple.launchd 1 com.apple.launchd System: Userspace shutdown begun at: Sun Apr 8 03:43:52 2012

-93773 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.airportd[226]: Beginning job manager shutdown with flags: RB_AUTOBOOT

-93538 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.airportd[226]: Job manager shutdown begun at: Sun Apr 8 03:43:52 2012

-93530 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.airportd[226]: No submanagers left.

-93517 1 com.apple.launchd 0 com.apple.qtkitserver Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-93507 1 com.apple.launchd 0 com.apple.qtkitserver Closing receive right for com.apple.qtkitserver

-93496 1 com.apple.launchd 0 com.apple.qtkitserver Mach service deleted: com.apple.qtkitserver

-93491 1 com.apple.launchd 0 com.apple.qtkitserver Removed

-93485 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-93481 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Closing receive right for com.apple.DataDetectors.DataDetectorsActionService

-93474 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Mach service deleted: com.apple.DataDetectors.DataDetectorsActionService

-93471 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Removed

-93468 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.airportd[226]: Removing.

-93466 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.airportd[226]: Removing job manager.

-93464 1 com.apple.launchd 227 0x100b07ed0.anonymous.xpchelper Reaping

-93457 1 com.apple.launchd 0 0x100b07ed0.anonymous.xpchelper Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-93454 1 com.apple.launchd 0 0x100b07ed0.anonymous.xpchelper Removed

-93452 1 com.apple.launchd 1 0x100b01650.anonymous.launchd Reaping

-93448 1 com.apple.launchd 0 0x100b01650.anonymous.launchd Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-93445 1 com.apple.launchd 0 0x100b01650.anonymous.launchd Removed

-93444 1 com.apple.launchd 226 0x100b0fc50.anonymous.airportd Reaping

-93440 1 com.apple.launchd 0 0x100b0fc50.anonymous.airportd Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-93437 1 com.apple.launchd 0 0x100b0fc50.anonymous.airportd Removed

-93296 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.airportd[226]: Job manager shutdown finished at: Sun Apr 8 03:43:52 2012

-93294 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.airportd[226]: Job manager shutdown took approximately 0 seconds.

-93284 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.peruser.4294967294: Beginning job manager shutdown with flags: RB_AUTOBOOT

-93167 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.peruser.4294967294: Job manager shutdown begun at: Sun Apr 8 03:43:52 2012

-93165 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.peruser.4294967294: No submanagers left.

-93160 1 com.apple.launchd 0 com.apple.cfpreferences-xpcservice Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-93158 1 com.apple.launchd 0 com.apple.cfpreferences-xpcservice Closing receive right for com.apple.cfpreferences-xpcservice

-93151 1 com.apple.launchd 0 com.apple.cfpreferences-xpcservice Mach service deleted: com.apple.cfpreferences-xpcservice

-93143 1 com.apple.launchd 0 com.apple.cfpreferences-xpcservice Removed

-93137 1 com.apple.launchd 0 com.apple.security.XPCKeychainSandboxCheck Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-93135 1 com.apple.launchd 0 com.apple.security.XPCKeychainSandboxCheck Closing receive right for com.apple.security.XPCKeychainSandboxCheck

-93129 1 com.apple.launchd 0 com.apple.security.XPCKeychainSandboxCheck Mach service deleted: com.apple.security.XPCKeychainSandboxCheck

-93125 1 com.apple.launchd 0 com.apple.security.XPCKeychainSandboxCheck Removed

-93123 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.peruser.4294967294: Removing.

-93121 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.peruser.4294967294: Removing job manager.

-92990 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.peruser.4294967294: Job manager shutdown finished at: Sun Apr 8 03:43:52 2012

-92988 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.peruser.4294967294: Job manager shutdown took approximately 0 seconds.

-92979 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.warmd[34]: Beginning job manager shutdown with flags: RB_AUTOBOOT

-92870 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.warmd[34]: Job manager shutdown begun at: Sun Apr 8 03:43:52 2012

-92869 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.warmd[34]: No submanagers left.

-92863 1 com.apple.launchd 0 com.apple.qtkitserver Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92861 1 com.apple.launchd 0 com.apple.qtkitserver Closing receive right for com.apple.qtkitserver

-92854 1 com.apple.launchd 0 com.apple.qtkitserver Mach service deleted: com.apple.qtkitserver

-92850 1 com.apple.launchd 0 com.apple.qtkitserver Removed

-92846 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92845 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Closing receive right for com.apple.DataDetectors.DataDetectorsActionService

-92839 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Mach service deleted: com.apple.DataDetectors.DataDetectorsActionService

-92833 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Removed

-92830 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.warmd[34]: Removing.

-92828 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.warmd[34]: Removing job manager.

-92827 1 com.apple.launchd 224 0x7f81ead2a490.anonymous.xpchelper Reaping

-92822 1 com.apple.launchd 0 0x7f81ead2a490.anonymous.xpchelper Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92819 1 com.apple.launchd 0 0x7f81ead2a490.anonymous.xpchelper Removed

-92818 1 com.apple.launchd 1 0x7f81ead2a190.anonymous.launchd Reaping

-92814 1 com.apple.launchd 0 0x7f81ead2a190.anonymous.launchd Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92807 1 com.apple.launchd 0 0x7f81ead2a190.anonymous.launchd Removed

-92805 1 com.apple.launchd 34 0x7f81ead28810.anonymous.warmd Reaping

-92801 1 com.apple.launchd 0 0x7f81ead28810.anonymous.warmd Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92798 1 com.apple.launchd 0 0x7f81ead28810.anonymous.warmd Removed

-92558 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.warmd[34]: Job manager shutdown finished at: Sun Apr 8 03:43:52 2012

-92552 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.warmd[34]: Job manager shutdown took approximately 0 seconds.

-92544 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.filecoordinatio[202]: Beginning job manager shutdown with flags: RB_AUTOBOOT

-92405 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.filecoordinatio[202]: Job manager shutdown begun at: Sun Apr 8 03:43:52 2012

-92403 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.filecoordinatio[202]: No submanagers left.

-92397 1 com.apple.launchd 0 com.apple.qtkitserver Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92396 1 com.apple.launchd 0 com.apple.qtkitserver Closing receive right for com.apple.qtkitserver

-92389 1 com.apple.launchd 0 com.apple.qtkitserver Mach service deleted: com.apple.qtkitserver

-92382 1 com.apple.launchd 0 com.apple.qtkitserver Removed

-92377 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92375 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Closing receive right for com.apple.DataDetectors.DataDetectorsActionService

-92370 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Mach service deleted: com.apple.DataDetectors.DataDetectorsActionService

-92367 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Removed

-92361 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.filecoordinatio[202]: Removing.

-92359 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.filecoordinatio[202]: Removing job manager.

-92358 1 com.apple.launchd 1 0x100b03c80.anonymous.launchd Reaping

-92353 1 com.apple.launchd 0 0x100b03c80.anonymous.launchd Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92351 1 com.apple.launchd 0 0x100b03c80.anonymous.launchd Removed

-92349 1 com.apple.launchd 202 0x100b03860.anonymous.filecoordinatio Reaping

-92345 1 com.apple.launchd 0 0x100b03860.anonymous.filecoordinatio Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92343 1 com.apple.launchd 0 0x100b03860.anonymous.filecoordinatio Removed

-92211 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.filecoordinatio[202]: Job manager shutdown finished at: Sun Apr 8 03:43:52 2012

-92209 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.filecoordinatio[202]: Job manager shutdown took approximately 0 seconds.

-92205 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.imagent[170]: Beginning job manager shutdown with flags: RB_AUTOBOOT

-92097 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.imagent[170]: Job manager shutdown begun at: Sun Apr 8 03:43:52 2012

-92095 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.imagent[170]: No submanagers left.

-92084 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92082 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Closing receive right for com.apple.DataDetectors.DataDetectorsActionService

-92076 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Mach service deleted: com.apple.DataDetectors.DataDetectorsActionService

-92072 1 com.apple.launchd 0 com.apple.DataDetectors.DataDetectorsActionService Removed

-92068 1 com.apple.launchd 0 com.apple.XType.FontHelper Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92065 1 com.apple.launchd 0 com.apple.XType.FontHelper Closing receive right for com.apple.XType.FontHelper

-92059 1 com.apple.launchd 0 com.apple.XType.FontHelper Mach service deleted: com.apple.XType.FontHelper

-92055 1 com.apple.launchd 0 com.apple.XType.FontHelper Removed

-92051 1 com.apple.launchd 0 com.apple.qtkitserver Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92050 1 com.apple.launchd 0 com.apple.qtkitserver Closing receive right for com.apple.qtkitserver

-92044 1 com.apple.launchd 0 com.apple.qtkitserver Mach service deleted: com.apple.qtkitserver

-92039 1 com.apple.launchd 0 com.apple.qtkitserver Removed

-92035 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.imagent[170]: Removing.

-92033 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.imagent[170]: Removing job manager.

-92032 1 com.apple.launchd 1 0x7f81ead28510.anonymous.launchd Reaping

-92028 1 com.apple.launchd 0 0x7f81ead28510.anonymous.launchd Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92025 1 com.apple.launchd 0 0x7f81ead28510.anonymous.launchd Removed

-92023 1 com.apple.launchd 123 0x7f81ead27db0.anonymous.launchd Reaping

-92020 1 com.apple.launchd 0 0x7f81ead27db0.anonymous.launchd Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92013 1 com.apple.launchd 0 0x7f81ead27db0.anonymous.launchd Removed

-92011 1 com.apple.launchd 170 0x7f81ead0ebc0.anonymous.imagent Reaping

-92007 1 com.apple.launchd 0 0x7f81ead0ebc0.anonymous.imagent Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

-92004 1 com.apple.launchd 0 0x7f81ead0ebc0.anonymous.imagent Removed

-91876 1 com.apple.launchd 1 com.apple.launchd System: com.apple.xpc.domain.imagent[170]: Job manager shutdown finished at: Sun Apr 8 03:43:52 2012



Goes on for quite a while using the same format and ends up....


valid

436323 1 com.apple.launchd 61 com.sophos.intercheck Job was sent SIGTERM.

438085 1 com.apple.launchd 230 com.apple.shutdown_monitor Getting key: 5

442436 1 com.apple.launchd 0 0x100b169b0.anonymous.kextunload Conceived

442445 1 com.apple.launchd 231 0x100b169b0.anonymous.kextunload This process showed up to the party while all the guests were leaving. Odds are that it will have a miserable time.

442449 1 com.apple.launchd 231 0x100b169b0.anonymous.kextunload Created PID 231 anonymously by PPID 61

442452 1 com.apple.launchd 231 0x100b169b0.anonymous.kextunload Getting key: 5

448270 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

448278 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead01430 data = 0x84 ident = 134 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT fflags = 0x0

448282 1 com.apple.launchd 61 com.sophos.intercheck Dispatching kevent callback.

448289 61 com.sophos.intercheck 61 com.sophos.intercheck (kernel) Kext unloading is disabled (com.sophos.kext.sav).

448291 61 com.sophos.intercheck 61 com.sophos.intercheck Failed to unload com.sophos.kext.sav - (libkern/kext) function disabled.

448418 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

448426 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81eb002000 data = 0x0 ident = 231 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

448429 1 com.apple.launchd 231 0x100b169b0.anonymous.kextunload Dispatching kevent callback.

448431 1 com.apple.launchd 231 0x100b169b0.anonymous.kextunload EVFILT_PROC event for job.

448436 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x100b169b0 data = 0x0 ident = 231 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

448438 1 com.apple.launchd 231 0x100b169b0.anonymous.kextunload Reaping

448446 1 com.apple.launchd 0 0x100b169b0.anonymous.kextunload Total rusage: utime 0.000000 stime 0.000000 maxrss 0 ixrss 0 idrss 0 isrss 0 minflt 0 majflt 0 nswap 0 inblock 0 oublock 0 msgsnd 0 msgrcv 0 nsignals 0 nvcsw 0 nivcsw 0

448451 1 com.apple.launchd 0 0x100b169b0.anonymous.kextunload Removed

448454 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

448457 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

448459 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

448461 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

448462 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

448464 1 com.apple.launchd 13 com.apple.diskarbitrationd Job is active: PID is still valid

448466 1 com.apple.launchd 13 com.apple.diskarbitrationd Job was sent SIGTERM.

448468 1 com.apple.launchd 61 com.sophos.intercheck Job is active: PID is still valid

448469 1 com.apple.launchd 61 com.sophos.intercheck Job was sent SIGTERM.

458050 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

458074 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead01430 data = 0x0 ident = 134 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

458083 1 com.apple.launchd 61 com.sophos.intercheck Dispatching kevent callback.

458103 1 com.apple.launchd 61 com.sophos.intercheck Standard out/error pipe closed

458159 1 com.apple.launchd 61 com.sophos.intercheck Tried to dispatch an already active job (PID is still valid).

458164 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

458178 1 com.apple.launchd 1 com.apple.launchd KEVENT[1]: udata = 0x7f81eb002000 data = 0x0 ident = 61 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

458185 1 com.apple.launchd 61 com.sophos.intercheck Dispatching kevent callback.

458190 1 com.apple.launchd 61 com.sophos.intercheck EVFILT_PROC event for job.

458201 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead01430 data = 0x0 ident = 61 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

458213 1 com.apple.launchd 61 com.sophos.intercheck Reaping

458314 1 com.apple.launchd 61 com.sophos.intercheck Exited 0.542490 seconds after the first signal was sent

458321 1 com.apple.launchd 0 com.sophos.intercheck Exited while shutdown in progress. Processes remaining: 4/0

458332 1 com.apple.launchd 0 com.sophos.intercheck Total rusage: utime 10.993311 stime 3.105564 maxrss 175759360 ixrss 0 idrss 0 isrss 0 minflt 77248 majflt 1003 nswap 0 inblock 26 oublock 43 msgsnd 108853 msgrcv 108851 nsignals 1 nvcsw 13218 nivcsw 5

458342 1 com.apple.launchd 0 com.sophos.intercheck Removed

458349 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

458353 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

458357 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

458361 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

458364 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

458368 1 com.apple.launchd 13 com.apple.diskarbitrationd Job is active: PID is still valid

458371 1 com.apple.launchd 13 com.apple.diskarbitrationd Job was sent SIGTERM.

622347 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

622362 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead1e390 data = 0x0 ident = 116 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

622369 1 com.apple.launchd 230 com.apple.shutdown_monitor Dispatching kevent callback.

622380 1 com.apple.launchd 230 com.apple.shutdown_monitor Standard out/error pipe closed

622412 1 com.apple.launchd 230 com.apple.shutdown_monitor Tried to dispatch an already active job (Monitoring shutdown).

622416 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

622426 1 com.apple.launchd 1 com.apple.launchd KEVENT[1]: udata = 0x7f81eb002000 data = 0x0 ident = 230 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

622431 1 com.apple.launchd 230 com.apple.shutdown_monitor Dispatching kevent callback.

622435 1 com.apple.launchd 230 com.apple.shutdown_monitor EVFILT_PROC event for job.

622443 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead1e390 data = 0x0 ident = 230 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

622452 1 com.apple.launchd 230 com.apple.shutdown_monitor Reaping

622529 1 com.apple.launchd 230 com.apple.shutdown_monitor Shutdown monitor has exited.

622536 1 com.apple.launchd 0 com.apple.shutdown_monitor Exited while shutdown in progress. Processes remaining: 3/0

622548 1 com.apple.launchd 0 com.apple.shutdown_monitor Total rusage: utime 0.009018 stime 0.007762 maxrss 1892352 ixrss 0 idrss 0 isrss 0 minflt 613 majflt 3 nswap 0 inblock 1 oublock 5 msgsnd 0 msgrcv 1 nsignals 0 nvcsw 7 nivcsw 11

622558 1 com.apple.launchd 0 com.apple.shutdown_monitor Removed

622565 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

622569 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

622573 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

622577 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

622580 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

622584 1 com.apple.launchd 13 com.apple.diskarbitrationd Job is active: PID is still valid

622588 1 com.apple.launchd 13 com.apple.diskarbitrationd Job was sent SIGTERM.

1196345 1 com.apple.launchd 1 com.apple.launchd System: Receive right returned to us: com.apple.metadata.mds

1196351 1 com.apple.launchd 44 com.apple.metadata.mds Tried to dispatch an already active job (PID is still valid).

1196355 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1196358 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

1196361 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

1196364 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

1196367 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

1196369 1 com.apple.launchd 13 com.apple.diskarbitrationd Job is active: PID is still valid

1196372 1 com.apple.launchd 13 com.apple.diskarbitrationd Job was sent SIGTERM.

1196419 1 com.apple.launchd 1 com.apple.launchd System: Receive right returned to us: com.apple.metadata.mds.xpcs

1196422 1 com.apple.launchd 44 com.apple.metadata.mds Tried to dispatch an already active job (PID is still valid).

1196425 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1196427 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

1196430 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

1196432 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

1196434 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

1196437 1 com.apple.launchd 13 com.apple.diskarbitrationd Job is active: PID is still valid

1196439 1 com.apple.launchd 13 com.apple.diskarbitrationd Job was sent SIGTERM.

1196466 1 com.apple.launchd 1 com.apple.launchd System: Receive right returned to us: com.apple.metadata.mds.xpc

1196469 1 com.apple.launchd 44 com.apple.metadata.mds Tried to dispatch an already active job (PID is still valid).

1196471 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1196474 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

1196476 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

1196479 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

1196481 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

1196484 1 com.apple.launchd 13 com.apple.diskarbitrationd Job is active: PID is still valid

1196486 1 com.apple.launchd 13 com.apple.diskarbitrationd Job was sent SIGTERM.

1196627 1 com.apple.launchd 1 com.apple.launchd System: Receive right returned to us: com.apple.DiskArbitration.diskarbitrationd

1196630 1 com.apple.launchd 13 com.apple.diskarbitrationd Tried to dispatch an already active job (PID is still valid).

1196633 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1196635 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

1196638 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

1196640 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

1196643 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

1196645 1 com.apple.launchd 13 com.apple.diskarbitrationd Job is active: PID is still valid

1196648 1 com.apple.launchd 13 com.apple.diskarbitrationd Job was sent SIGTERM.

1197302 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1197314 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ec0000a0 data = 0x0 ident = 66 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

1197347 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1197353 1 com.apple.launchd 1 com.apple.launchd KEVENT[1]: udata = 0x7f81ead0af90 data = 0x0 ident = 71 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

1197357 1 com.apple.launchd 13 com.apple.diskarbitrationd Dispatching kevent callback.

1197366 1 com.apple.launchd 13 com.apple.diskarbitrationd Standard out/error pipe closed

1197391 1 com.apple.launchd 13 com.apple.diskarbitrationd Tried to dispatch an already active job (PID is still valid).

1197394 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1197401 1 com.apple.launchd 1 com.apple.launchd KEVENT[2]: udata = 0x7f81eb002000 data = 0x0 ident = 13 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

1197405 1 com.apple.launchd 13 com.apple.diskarbitrationd Dispatching kevent callback.

1197407 1 com.apple.launchd 13 com.apple.diskarbitrationd EVFILT_PROC event for job.

1197413 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead0af90 data = 0x0 ident = 13 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

1197420 1 com.apple.launchd 13 com.apple.diskarbitrationd Reaping

1197459 1 com.apple.launchd 13 com.apple.diskarbitrationd Exited 1.282544 seconds after the first signal was sent

1197464 1 com.apple.launchd 0 com.apple.diskarbitrationd Exited while shutdown in progress. Processes remaining: 2/0

1197472 1 com.apple.launchd 0 com.apple.diskarbitrationd Total rusage: utime 0.040310 stime 0.040572 maxrss 5173248 ixrss 0 idrss 0 isrss 0 minflt 5563 majflt 42 nswap 0 inblock 40 oublock 21 msgsnd 0 msgrcv 1 nsignals 7 nvcsw 2 nivcsw 530

1197476 1 com.apple.launchd 0 com.apple.diskarbitrationd Closing receive right for com.apple.DiskArbitration.diskarbitrationd

1197488 1 com.apple.launchd 0 com.apple.diskarbitrationd Mach service deleted: com.apple.DiskArbitration.diskarbitrationd

1197495 1 com.apple.launchd 0 com.apple.diskarbitrationd Removed

1197499 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1197502 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

1197505 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

1197508 1 com.apple.launchd 44 com.apple.metadata.mds Job is active: PID is still valid

1197510 1 com.apple.launchd 44 com.apple.metadata.mds Job was sent SIGTERM.

1200274 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1200283 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ec000af0 data = 0x0 ident = 102 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

1200476 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1200487 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead160a0 data = 0x0 ident = 111 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

1200491 1 com.apple.launchd 44 com.apple.metadata.mds Dispatching kevent callback.

1200514 1 com.apple.launchd 44 com.apple.metadata.mds Standard out/error pipe closed

1200536 1 com.apple.launchd 44 com.apple.metadata.mds Tried to dispatch an already active job (PID is still valid).

1200539 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1200545 1 com.apple.launchd 1 com.apple.launchd KEVENT[1]: udata = 0x7f81eb002000 data = 0x0 ident = 44 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

1200547 1 com.apple.launchd 44 com.apple.metadata.mds Dispatching kevent callback.

1200549 1 com.apple.launchd 44 com.apple.metadata.mds EVFILT_PROC event for job.

1200554 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead160a0 data = 0x0 ident = 44 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

1200559 1 com.apple.launchd 44 com.apple.metadata.mds Reaping

1200586 1 com.apple.launchd 44 com.apple.metadata.mds Exited 1.286688 seconds after the first signal was sent

1200590 1 com.apple.launchd 0 com.apple.metadata.mds Exited while shutdown in progress. Processes remaining: 1/0

1200596 1 com.apple.launchd 0 com.apple.metadata.mds Total rusage: utime 0.859520 stime 0.867720 maxrss 49491968 ixrss 0 idrss 0 isrss 0 minflt 13780 majflt 4547 nswap 0 inblock 63 oublock 563 msgsnd 0 msgrcv 1 nsignals 1 nvcsw 1507 nivcsw 8866

1200600 1 com.apple.launchd 0 com.apple.metadata.mds Closing receive right for com.apple.metadata.mds

1200610 1 com.apple.launchd 0 com.apple.metadata.mds Mach service deleted: com.apple.metadata.mds

1200613 1 com.apple.launchd 0 com.apple.metadata.mds Closing receive right for com.apple.metadata.mds.xpcs

1200621 1 com.apple.launchd 0 com.apple.metadata.mds Mach service deleted: com.apple.metadata.mds.xpcs

1200623 1 com.apple.launchd 0 com.apple.metadata.mds Closing receive right for com.apple.metadata.mds.xpc

1200630 1 com.apple.launchd 0 com.apple.metadata.mds Mach service deleted: com.apple.metadata.mds.xpc

1200635 1 com.apple.launchd 0 com.apple.metadata.mds Removed

1200638 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1200640 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

1200643 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM.

1200645 1 com.apple.launchd 23 com.apple.securityd Closing shutdown transaction for job.

1200647 1 com.apple.launchd 23 com.apple.securityd Job is now clean. Killing.

1200659 1 com.apple.launchd 23 com.apple.securityd Sent SIGKILL signal

1201138 1 com.apple.launchd 1 com.apple.launchd System: Receive right returned to us: com.apple.SecurityServer

1201155 1 com.apple.launchd 23 com.apple.securityd Tried to dispatch an already active job (PID is still valid).

1201157 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1201160 1 com.apple.launchd 23 com.apple.securityd Job is active: PID is still valid

1201162 1 com.apple.launchd 23 com.apple.securityd Job was sent SIGTERM and SIGKILL.

1202392 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1202400 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x100b004a0 data = 0x0 ident = 84 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

1202422 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1202428 1 com.apple.launchd 1 com.apple.launchd KEVENT[1]: udata = 0x7f81ead1e780 data = 0x0 ident = 89 filter = EVFILT_READ flags = EV_ADD|EV_RECEIPT|EV_EOF fflags = 0x0

1202431 1 com.apple.launchd 23 com.apple.securityd Dispatching kevent callback.

1202436 1 com.apple.launchd 23 com.apple.securityd Standard out/error pipe closed

1202456 1 com.apple.launchd 23 com.apple.securityd Tried to dispatch an already active job (PID is still valid).

1202458 1 com.apple.launchd 1 com.apple.launchd Dispatching kevent...

1202463 1 com.apple.launchd 1 com.apple.launchd KEVENT[2]: udata = 0x7f81eb002000 data = 0x0 ident = 23 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

1202466 1 com.apple.launchd 23 com.apple.securityd Dispatching kevent callback.

1202468 1 com.apple.launchd 23 com.apple.securityd EVFILT_PROC event for job.

1202472 1 com.apple.launchd 1 com.apple.launchd KEVENT[0]: udata = 0x7f81ead1e780 data = 0x0 ident = 23 filter = EVFILT_PROC flags = EV_ADD|EV_RECEIPT|EV_CLEAR|EV_EOF|EV_ONESHOT fflags = NOTE_EXIT

1202477 1 com.apple.launchd 23 com.apple.securityd Reaping

1202506 1 com.apple.launchd 23 com.apple.securityd Exited 1.289291 seconds after the first signal was sent

1202510 1 com.apple.launchd 0 com.apple.securityd Exited while shutdown in progress. Processes remaining: 0/0

1202524 1 com.apple.launchd 0 com.apple.securityd Job was last to exit during shutdown of: System.

1202530 1 com.apple.launchd 0 com.apple.securityd Total rusage: utime 0.118120 stime 0.101160 maxrss 8232960 ixrss 0 idrss 0 isrss 0 minflt 2691 majflt 202 nswap 0 inblock 17 oublock 28 msgsnd 0 msgrcv 1 nsignals 1 nvcsw 33 nivcsw 4044

1202533 1 com.apple.launchd 0 com.apple.securityd Closing receive right for com.apple.SecurityServer

1202543 1 com.apple.launchd 0 com.apple.securityd Mach service deleted: com.apple.SecurityServer

1202548 1 com.apple.launchd 0 com.apple.securityd Removed

1202551 1 com.apple.launchd 1 com.apple.launchd System: No submanagers left.

1202553 1 com.apple.launchd 1 com.apple.launchd System: Removing.

1202556 1 com.apple.launchd 1 com.apple.launchd System: Removing job manager.

1202709 1 com.apple.launchd 1 com.apple.launchd System: Userspace shutdown finished at: Sun Apr 8 03:43:54 2012

1202716 1 com.apple.launchd 1 com.apple.launchd System: Userspace shutdown took approximately 2 seconds.

1202740 1 com.apple.launchd 1 com.apple.launchd VM statistics (now - orig): Free: 88134 Active: -80516 Inactive: -649 Reactivations: 0 PageIns: 11 PageOuts: 0 Faults: 1435 COW-Faults: 225 Purgeable: -1669 Purges: 0

1202768 1 com.apple.launchd 1 com.apple.launchd System: About to call: reboot(RB_AUTOBOOT).


Appreciate any ideas. Might have to send it back to Apple. Would be nice to have an idea of what the problem is and how to avoid it before then. Thanks again.

Apr 9, 2012 3:03 PM in response to nerowolfe

I realize I will need to rebuild the system. What I want to try and figutre out is how to prevent further issues. MAC security is a serious concern and there are lots of vulnerabilities that are being exploited and we are just starting to see the tip of the iceberg.


http://ca.news.yahoo.com/blogs/right-click/mac-users-hit-global-trojan-malware-o utbreak-211940564.html


I have since discovered XCODE applications running on my system like background instruments collecting data and relaying information without my knowlege or permission.


What is even more problematic for me is that anyone can download XCODE from the Apple store for free. Included in the package are applications that facilitate all sorts of malicious activities.


I will probably need to engage Apple as previous re-installs haven't completely removed persistant files located on the 200M hinding on disk0.


With 40% of the world smart phone market and tools like XCODE out there, APPLE is a rich target for exploits. Unfortunately, APPLE's under estimation of the threat and the communities unwilligness to take it seriously only perpetuate the problem.


Cheers!






Apr 9, 2012 7:33 PM in response to MAC ATTACKED

It is a serious issue. I read somewhere that one of the parts of the malware appears to be a keystroke logger, but that might be misinformation.

Once, hackers were happy messing up people's computers, taking down servers, etc.

Today, it is a big money thing. These trojans steal personal information, credit card numbers, all kinds of stuff that can be sold or used to steal money; even ID theft.


Off the computer topic. I suggest that everyone should have some kind of personal ID theft prevention program, that monitors credit cards, SSNs, bank accounts, etc.

ID theft today is a big business and growing.

These trojans, to paraphrase an old expression about cars, are not your father's trojans. (No pun intended).

We are living in a new world and very dangerous times.

Apr 10, 2012 10:05 AM in response to HACKINT0SH

I didn't know keylogging and turning my MAC into a Bot Net is a matter that is of little concern. Keep your head in the sand. The longer you deny the problem the bigger it gets. They've figured out how to defeat the system. You'll see. It will get much worse. In my case the system was completely compromised just by visiting a compromised web site. Some of the system protocols are just asking for trouble. You just keep pretending the problem doesn't exist.

Apr 10, 2012 10:32 AM in response to MAC ATTACKED

There is nothing called "backgroundinstruments" that is part of the current version of XCode. Also note that the current malware that is circulating (Flashback) will self-delete at the time of infection if you have XCode installed. Plus, it looks like you have Sophos installed, and I have personally verified that it will prevent one variant, at least, from being installed.


You've said a lot, but also very little of substance. I still have no real idea of what symptoms you are seeing that lead you to believe you have malware, or how you claim to know that keylogging is going on. If you could start over from the beginning, explaining the behavior you are seeing in clear, simple words, that would help us assist you.

Apr 10, 2012 11:16 AM in response to thomas_r.

There is a part of XCode called "backgroundinstruments"


/Applications/Xcode.app/Contents/Library/LoginItems/backgroundinstruments.app/Co ntents/MacOS/backgroundinstruments


Much else of what you refer to in your first post is part of Kaspersky's - another anti-virus application.


While I fully accept that your Mac has been compromised I'm unclear as to how you know this? What are the actual symptoms? Everything you've posted refer to perfectly normal applications.

Apr 10, 2012 11:29 AM in response to Yer_Man

There is a part of XCode called "backgroundinstruments"


Not here. I have the current version of XCode (4.2), and there is no such file. Not only did I open up the XCode application package manually and fail to find a LoginItems folder at the indicated location, but I searched the entire Developer folder (which is where my copy of XCode resides) using EasyFind and found no matches.


But even if an older version of XCode includes that, it's a huge stretch to consider it, or any of the rest of XCode, malicious.

Apr 10, 2012 5:37 PM in response to thomas_r.

backgroundinstruments is the name given to the Instruments program running as an active application. Instruments is part of the XCODE tool suite (https://developer.apple.com/library/mac/documentation/developertools/conceptual/ InstrumentsUserGuide/InstrumentsUserGuide.pdf). Sorry you weren't able to make that connection.


Since I didn't set up any traces, tracking etc. someone did.


There are foreign files in my tmp folder that I cannot remove that were written via the safari plugin app.


The contents are posted.


I have given the machine to Apple to examine and restore. Maybe they can see what more can be done to prevent further attacks.



I have reported homepage hijackers, driveby malware attacks etc. Each time someone tries to explain away the situation because they don't want to accept that OSX is vulnerable.


It is. Be careful. The world is round.


- Copernicus.

Apr 10, 2012 5:48 PM in response to MAC ATTACKED

Each time someone tries to explain away the situation because they don't want to accept that OSX is vulnerable.


Few people try to deny that there is malware that affects Macs. Those who do are not well informed.


However, nothing you have said makes much sense, or sounds remotely like any of the currently known Mac malware. If you aren't willing to explain more clearly, people expressing skepticism about your claims will simply be your way of life.

Apr 10, 2012 5:56 PM in response to thomas_r.

Im not sure why you feel that suddeen changes to the boot log whereby the security protocol changes is normal. I'm an idiot for once again trying to post anything to this community. 500,000 Apple computers fell victim to security threats. Still everyonbe wants to believe Mac's are invulnerable.


I have given the computer to APPLE to study and rebuild. There are very real threats in the wild. I'm not arguing with you about whether or not XCODE Instruments is called backgroundinstruments. I'm not going to try and convince you. I know what is out there and how it is getting in.


Good luck and fairwell.

MALWARE access via hole in Browser Plugin Process. Applications achieving root level authorization. Please help.

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.