mark00thomas

Q: Finding and removing malware, key-loggers, spyware

There have been many threads about finding keylogers and spywear on OSX, but most of them are akin to giving a man a fish than teaching him to fish. For instance Linc Davis responded to the below thread with some instructions in terminal and requested the output be copied to the thread. This will not help anyone who doesn't have access to a "Linc Davis."

 

https://discussions.apple.com/thread/4243511?start=0&tstart=0

 

Is there a tutorial or something that we can use to monitor these kinds of things? I look in Console, Activity Monitor, Little Snitch but I don't really know what I'm looking for. And when you do find it how do you remove it? I heard once that if you back up your infected computer to a drive and computer you now connect that drive to can get infected (like my freshly wiped HD with a new copy of OSX). A list of all known malware process names.

 

After looking at my output in the above link someone suggested that  com.BT.kext.bpkkext was a suspect and that Blazing tools Perfect Keylogger was the software. I can't remove it; I even downloaded the uninstaller from Blazing tools.

MacBook Pro (Retina, 15-inch, Early 2013), OS X Mountain Lion (10.8.4), Many outdated, but unbreakable macs

Posted on Aug 2, 2013 4:11 PM

Close

Q: Finding and removing malware, key-loggers, spyware

  • All replies
  • Helpful answers

Page 1 Next
  • by mark00thomas,

    mark00thomas mark00thomas Aug 2, 2013 4:12 PM in response to mark00thomas
    Level 1 (4 points)
    Mac OS X
    Aug 2, 2013 4:12 PM in response to mark00thomas

    Here is my output, if someone only has time for a fish instead of a leason. Thanks in Advanced!

     

    kextstat -kl | awk '!/com\.apple/{printf "%s %s\n", $6, $7}'

     

     

    com.oxsemi.driver.OxsemiDeviceType00 (1.28.13)

    at.obdev.nke.LittleSnitch (3932)

    com.asix.driver.ax88179_178a (1.3.0)

    com.LaCie.ScsiType00 (1.2.13)

    com.BT.kext.bpkkext (1.0.0)

    com.displaylink.driver.DisplayLinkDriver (1.7)

    com.parallels.kext.prl_usb_connect (7.0

    com.parallels.kext.prl_hypervisor (7.0

    com.parallels.kext.prl_hid_hook (7.0

    com.parallels.kext.prl_netbridge (7.0

    com.parallels.kext.prl_vnic (7.0

    com.github.osxfuse.filesystems.osxfusefs (2.6.0)

    Black-Book-108:~ Old_blackbook$

     

    Black-Book-108:~ Old_blackbook$ sudo launchctl list | sed 1d | awk '!/0x|com\.(apple|openssh|vix)|edu\.mit|org\.(amavis|apache|cups|isc|ntp|postfi x|x)/{print $3}'

    Password:

    com.agilebits.onepassword-osx-thumbs

    com.parallels.vm.prl_naptd

    com.syniumsoftware.CleanAppDaemon

    com.parallels.desktop.launchdaemon

    com.microsoft.office.licensing.helper

    com.micromat.TechToolProDaemon

    com.google.keystone.daemon

    com.displaylink.displaylinkmanager

    com.adobe.SwitchBoard

    com.adobe.fpsaud

    com.absolute.rpcnet

    com.absolute.rpcgeo

    at.obdev.littlesnitchd

    Black-Book-108:~ Old_blackbook$

     

    Black-Book-108:~ Old_blackbook$ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'

    com.dayoneapp.dayone-agent

    com.fiplab.clipboardhelper

    com.joeworkman.mac.ClimateHelper

    com.agilebits.onepassword-osx-helper

    com.thursby.pkard.tokendagent

    com.parallels.vm.prl_pcproxy

    com.parallels.DesktopControlAgent

    com.parallels.desktop.client.launch

    com.micromat.TechToolProAgent

    com.lacie.eventsactions.launcher.agent

    com.google.keystone.system.agent

    com.displaylink.useragent

    com.BT.BPK

    com.amazon.sendtokindle.launcher

    at.obdev.LittleSnitchUIAgent

    com.google.Chrome.framework.service_process/Users/Old_blackbook/Library/Applicat ion_Support/Google/Chrome

    com.adobe.ARM.de23d1e3aa2d00ce38d73f10fcbdc8dcaaaf6be989610710a1ddda77

    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae

    com.adobe.ARM.031ead678131651e32346abaaf859369f569f63bac6112fd126a5660

    Black-Book-108:~ Old_blackbook$

     

    Black-Book-108:~ Old_blackbook$ ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null

    /Library/Components:

     

    /Library/Extensions:

     

    /Library/Frameworks:

    AEProfiling.framework

    AERegistration.framework

    Adobe AIR.framework

    AudioMixEngine.framework

    EWSMac.framework

    Inventoryx86.framework

    MacFUSE.framework

    NyxAudioAnalysis.framework

    OSXFUSE.framework

    PluginManager.framework

    Sysinfo.framework

    TSLicense.framework

    geo.framework

    iTunesLibrary.framework

    wceprv.framework

     

    /Library/Input Methods:

     

    /Library/Internet Plug-Ins:

    AdobeAAMDetect.plugin

    AdobePDFViewer.plugin

    AdobePDFViewerNPAPI.plugin

    DirectorShockwave.plugin

    Flash Player.plugin

    Flip4Mac WMV Plugin.plugin

    JavaAppletPlugin.plugin

    Quartz Composer.webplugin

    QuickTime Plugin.plugin

    SharePointBrowserPlugin.plugin

    SharePointWebKitPlugin.webplugin

    WebClient.plugin

    flashplayer.xpt

    googletalkbrowserplugin.plugin

    npgtpo3dautoplugin.plugin

    nsIQTScriptablePlugin.xpt

    o1dbrowserplugin.plugin

     

    /Library/Keyboard Layouts:

     

    /Library/LaunchAgents:

    at.obdev.LittleSnitchUIAgent.plist

    com.BT.BPK.plist

    com.adobe.AAM.Updater-1.0.plist

    com.amazon.sendtokindle.launcher.plist

    com.displaylink.useragent-prelogin.plist

    com.displaylink.useragent.plist

    com.google.keystone.agent.plist

    com.lacie.eventsactions.launcher.agent.plist

    com.micromat.TechToolProAgent.plist

    com.parallels.DesktopControlAgent.plist

    com.parallels.desktop.launch.plist

    com.parallels.vm.prl_pcproxy.plist

    com.thursby.pkard.tokendagent.plist

     

    /Library/LaunchDaemons:

    at.obdev.littlesnitchd.plist

    com.absolute.rpcgeo.plist

    com.absolute.rpcnet.plist

    com.adobe.SwitchBoard.plist

    com.adobe.fpsaud.plist

    com.displaylink.displaylinkmanager.plist

    com.displaylink.usbnivolistener.plist

    com.google.keystone.daemon.plist

    com.micromat.TechToolProDaemon.plist

    com.microsoft.office.licensing.helper.plist

    com.parallels.desktop.launchdaemon.plist

    com.syniumsoftware.CleanAppDaemon.plist

     

    /Library/PreferencePanes:

    CleanApp Logging Service.prefPane

    Flash Player.prefPane

    Flip4Mac WMV.prefPane

    HyperDock.prefpane

    OSXFUSE.prefPane

    TechTool Protection.prefPane

     

    /Library/PrivilegedHelperTools:

    DisplayLink

    com.microsoft.office.licensing.helper

     

    /Library/QuickLook:

    ParallelsQL.qlgenerator

    iBooksAuthor.qlgenerator

    iWork.qlgenerator

     

    /Library/QuickTime:

    AppleIntermediateCodec.component

    AppleMPEG2Codec.component

    Flip4Mac WMV Advanced.component

    Flip4Mac WMV Export.component

    Flip4Mac WMV Import.component

     

    /Library/ScriptingAdditions:

    Adobe Unit Types.osax

    BXDockPlugin.osax

     

    /Library/Spotlight:

    Microsoft Office.mdimporter

    ParallelsMD.mdimporter

    iBooksAuthor.mdimporter

    iWork.mdimporter

     

    /Library/StartupItems:

    PKard

     

    /etc/mach_init.d:

     

    /etc/mach_init_per_login_session.d:

     

    /etc/mach_init_per_user.d:

     

    Library/Address Book Plug-Ins:

    SkypeABDialer.bundle

    SkypeABSMS.bundle

    YMsgrCallABPlugin.bundle

    YMsgrMsnABPlugin.bundle

    YMsgrSmsABPlugin.bundle

    YMsgrYimABPlugin.bundle

     

    Library/Fonts:

     

    Library/Frameworks:

    EWSMac.framework

     

    Library/Input Methods:

    .localized

     

    Library/Internet Plug-Ins:

    CitrixOnlineWebDeploymentPlugin.plugin

    Picasa.plugin

     

    Library/Keyboard Layouts:

     

    Library/LaunchAgents:

    com.adobe.ARM.031ead678131651e32346abaaf859369f569f63bac6112fd126a5660.plist

    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist

    com.adobe.ARM.de23d1e3aa2d00ce38d73f10fcbdc8dcaaaf6be989610710a1ddda77.plist

    com.apple.AddressBook.ScheduledSync.PHXCardDAVSource.F940DCE7-790C-4149-8C3E-3CC 8849882C8.plist

    com.apple.FolderActions.enabled.plist

    com.apple.FolderActions.folders.plist

    com.google.Chrome.framework.plist

     

    Library/PreferencePanes:

     

    Library/Services:

    .DS_Store

    SymbolicLinker.service

    Toggle Hidden Files.workflow

    Black-Book-108:~ Old_blackbook$

     

     

    Black-Book-108:~ Old_blackbook$ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null

    iTunesHelper, Quicksilver, Spark Daemon, Dropbox, HyperDock Helper, Google Chrome, Things Helper, BackTrackBA

  • by John Galt,Helpful

    John Galt John Galt Aug 2, 2013 5:24 PM in response to mark00thomas
    Level 9 (50,389 points)
    Mac OS X
    Aug 2, 2013 5:24 PM in response to mark00thomas

    mark00thomas wrote:

     

    After looking at my output in the above link someone suggested that  com.BT.kext.bpkkext was a suspect and that Blazing tools Perfect Keylogger was the software.

     

    That seems to be the case. Keylogging software can employ any number of system modifications to accomplish their tasks.

     

    In the case of "Blazing Tools Perfect Keylogger" that appears to be installed, if their uninstaller did not eradicate it, one solution guaranteed to be reliable would be to completely erase your boot volume and rebuild your system. Short of that extreme though, I recommend you exhaustively search for its components in each of the following locations in addition to the above paths (some may be repeated):

     

    /Library

    /Library/Application Support

    /Library/Bundles

    /Library/Caches

    /Library/Extensions

    /Library/Frameworks

    /Library/Preferences

    /System/Library/Extensions

    /System/Library/LaunchAgents

    /System/Library/LaunchDaemons

    ~/Library

    ~/Library/Application Support

    ~/Library/Caches

    ~/Library/LaunchAgents

    ~/Library/Preferences

    ~/Library/Preferences/ByHost

     

    To easily navigate to each location triple-click the line that contains the path to select it, and then right click (or control-click) to bring up a contextual menu. Select Services > Reveal. A Finder window will open with the folder selected. Open the selected folder, scrutinize it for anything that may be related to Blazing Tools (com.BT.kext.bpkkext, com.BT.BPK, and PKard are three examples), and drag the suspicious file to the Desktop, or directly to the Trash. You will need to authenticate.

     

    Recursively apply this procedure to ensure that a running process that remains does not re-create one of the keylogger's required components. I have no reason to believe that will occur but it is possible.

     

    Back up your system prior to performing the above.

     

    I heard once that if you back up your infected computer to a drive and computer you now connect that drive to can get infected

     

    It's not quite as simple as you describe. Backing up your Mac does not migrate files from the backup to the source. However, an active keylogger or similar app could conceivably install itself on a mounted bootable volume. It would not be active on that volume unless you were to boot from it though.

     

    You will find no general purpose tutorial for the above because every keylogging app will have different ways of functioning and will have different places to hide their files. Keyloggers have legitimate purposes and won't generally be characterized as malware, but like anything else installed on a Mac it is incumbent upon its user to know how to uninstall it. Not all programs have uninstallers, and those that do may or may not eradicate all its components. It is even possible that Blazing Tools' uninstaller did in fact render it inert, but I would not trust that to be the case given that at least two of its components remain present on your Mac.

  • by Linc Davis,

    Linc Davis Linc Davis Aug 2, 2013 6:31 PM in response to mark00thomas
    Level 10 (208,037 points)
    Applications
    Aug 2, 2013 6:31 PM in response to mark00thomas

    Yes, a keylogger is installed.

      
    What you should do next depends on how the keylogger got there. I'm assuming you didn't install it yourself. For example:
       
    If you're a minor, and the keylogger was installed by a parent or guardian in order to supervise your behavior, that's legitimate (though you may not like it.) You should discuss the matter with the responsible adult(s).
       
    If you're an adult, and the keylogger was installed without your permission by another adult on your personal computer, then the computer may be evidence of a crime or a civil wrong. In that case, I suggest you seek legal advice before making any changes.
        
    If the computer is not yours, but was issued to you by a school or employer, then you shouldn't do anything. Don't expect privacy when using a computer that's under someone else's control. Use it only as intended by the owner.
  • by Kurt Lang,Helpful

    Kurt Lang Kurt Lang Aug 2, 2013 7:33 PM in response to mark00thomas
    Level 8 (38,024 points)
    Mac OS X
    Aug 2, 2013 7:33 PM in response to mark00thomas

    Another to add to Linc's possibilities.

     

    Have you installed illegal software from torrent, or other sharing sites. This is the number one way crooks are attacking Mac users. They stuff all kinds of extra packages into commercial software installers you don't know about. Once you enter your admin password to allow the software you expect to install, it also now has permission to install the extras. It doesn't have to ask you again for those.

  • by mark00thomas,

    mark00thomas mark00thomas Aug 2, 2013 10:26 PM in response to mark00thomas
    Level 1 (4 points)
    Mac OS X
    Aug 2, 2013 10:26 PM in response to mark00thomas

    The computer is my personal computer that I use for work and home. I think my wife, soon to be ex-wife, put it on there are she would be the only one with "root level access."

     

    John Galt, I'm still searching those folders. Thanks for the tips. Here is one of the files I found saved as a .txt file. I don't know if it is save for anyone to open though.

     

    https://www.dropbox.com/s/sb1i8se263q0w73/Cache%20copy.txt

     

    Kurt, small confession, I wanted to try a program that didn't offer a free trial to see if it would accomplish my task so I used a bit torrent to download it, and have since purchased it. I never thought they could also all to the installer. I'll have to stick to the developers website.

     

    How did you guys know that com.BT.kext was not suposed to be there? I do a fair bit of snooping in the hidded files & folders on my Mac, but how would I know that something like com.BT.kext shouldn't be there and that wceprv.framework should be?

  • by mark00thomas,

    mark00thomas mark00thomas Aug 2, 2013 10:35 PM in response to mark00thomas
    Level 1 (4 points)
    Mac OS X
    Aug 2, 2013 10:35 PM in response to mark00thomas

    I also have the "firewall" app Little Snitch running and usbmuxd, helpd, fpsaud, sntp, and netbiosd etc. are frequently trying to make connections to the Internet.

     

    My normal rull of thumb is it an alert come up when I'm trying to do something, and it will not proceed without an OK from little snitch then I allow it. If I was just going about my business; then I deny them.

  • by mark00thomas,

    mark00thomas mark00thomas Aug 2, 2013 10:37 PM in response to mark00thomas
    Level 1 (4 points)
    Mac OS X
    Aug 2, 2013 10:37 PM in response to mark00thomas

    I do have a "keyloger" so to speak, that just records what I type excluding passwords: BackTrack.

  • by ysureican,

    ysureican ysureican Aug 2, 2013 11:01 PM in response to John Galt
    Level 1 (9 points)
    Aug 2, 2013 11:01 PM in response to John Galt

    Dear mark00thomas

     

    Whew..... It looks like there is a lot of effort/work applied on your endeavor already just in Posting by themselves.  Repeat please, Whew.

    I pondered this same concern and hope my solution may be of some avenue for you to explore.

     

    My Solution:

    I went to the Apple Apps , (icon on your dock in OS X 10.8.4) and purchased the 'Bitdefender Virus Scanner' Version 2.21, then found it to be very effective to eliminate my concerns somewhat similar to yours. 

     

    Summary:

    That's it.  __________Simple on my end> hopefully for you too<..

    Then let's have one of the following: coffee/tea/soda/cup of water break to get ones' (second wind & keeping our) systems sparkling clean. lol  

     

    Authored Statements:  ysureican.____

  • by John Galt,

    John Galt John Galt Aug 3, 2013 7:21 AM in response to ysureican
    Level 9 (50,389 points)
    Mac OS X
    Aug 3, 2013 7:21 AM in response to ysureican

    ysureican wrote:

     

    ... I went to the Apple Apps , (icon on your dock in OS X 10.8.4) and purchased the 'Bitdefender Virus Scanner' ...

     

    Keyloggers are not viruses, Bitdefender is utterly useless, and the OP's concerns are not at all similar to yours.

     

    A keylogger is not malware either. It is a tool with legitimate uses, but it can nevertheless be used by someone with malicious intent.

     

    There is no commercial product that will keep your Mac "sparking clean". Bitdefender and similar junk will at best convey a misplaced sense of security, and at worst will cause your Mac to run poorly.

  • by John Galt,

    John Galt John Galt Aug 3, 2013 8:08 AM in response to mark00thomas
    Level 9 (50,389 points)
    Mac OS X
    Aug 3, 2013 8:08 AM in response to mark00thomas

    Little Snitch can be very useful, but it can also cause needless concern. OS X has many processes that require outgoing connections and there are many legitimate Apple apps that require them to work. If you use LS to block them your Mac may not work as expected and then you have other problems. Use it as you wish, but like everything else you have to be familiar with its operation and limitations for it to be an effective tool.

     

    How did you guys know that com.BT.kext was not suposed to be there?

     

    Many years of using many Macs, resulting in a general familiarity with what is supposed to be present and how they are designed to work. Anything extraneous becomes as obvious as an intruder in your own home, deserving of the appropriate scrutiny.

     

    Knowing what is installed and its intended use is a fundamental principle for using any computer. Unfortunately someone with malicious intent with physical access to your Mac - a future former spouse in your case - has unfettered ability to install anything for purposes limited only to the imagination. This is not limited to software since it is entirely conceivable that hardware modifications can record keystrokes, passwords, etc. for future retrieval.

     

    It's also quite likely that installing something downloaded from a torrent site contained malicious software. Given these uncertainties, I once again strongly favor erasing your Mac completely and rebuilding it from that known state. However, if you have reason to believe someone modified your Mac you may wish to preserve the evidence and pursue legal remedies. This lies well outside the scope any help I am able to provide.

  • by andyBall_uk,

    andyBall_uk andyBall_uk Aug 3, 2013 8:38 AM in response to mark00thomas
    Level 7 (20,495 points)
    Aug 3, 2013 8:38 AM in response to mark00thomas

    The item you posted appears to be an empty cache file, perhaps from Safari.

     

    Searching by name for something that might want to be hidden could well fall short, since the developers could have named the files most anything, rather than helpfully 'com.keylog.something'.  I'd still suggest erase/install & selectively import, unless you've very good reason to think that Blazing tools was the start & finish of any efforts to see what you do... & even then, I'd want confirmation from BT about what was installed.

     

    The pkard references are likely this, not BTPK.  I don't recognise wceprv.framework

  • by thomas_r.,

    thomas_r. thomas_r. Aug 4, 2013 6:20 AM in response to mark00thomas
    Level 7 (30,944 points)
    Mac OS X
    Aug 4, 2013 6:20 AM in response to mark00thomas

    Is there a tutorial or something that we can use to monitor these kinds of things?

     

    There's been a lot of information posted on this topic (and a bit of misinformation as well), but I haven't seen what I would say was a complete answer to this question. The bottom line is that there is no set of techniques or software that you can use to detect any and all keyloggers. If someone untrusted has had physical access to the machine in question, you cannot know what may have been done, and you will never be able to be sure that you have found everything. In such a case, your only choice that will ensure your security is to erase the hard drive and reinstall the system from scratch. See:

     

    How to reinstall Mac OS X from scratch

     

    Since you seem to be in the middle of a domestic dispute and suspect that your wife, who would have had access, might have installed something, this would be an appropriate action to take.

  • by g_wolfman,

    g_wolfman g_wolfman Aug 4, 2013 8:51 AM in response to mark00thomas
    Level 4 (1,141 points)
    Aug 4, 2013 8:51 AM in response to mark00thomas

    I do hate to throw fuel on a fire...but if this is your "personal" computer (eg, each of you has a seperate computer with only your personal accounts on it) and your spouse has for all intents and purposes installed malware on it...you may also want to consult your attorney.  Especially if you think that whatever she has been doing on your computer may come up later during a divorce.

     

    Sad, but better to be safe than sorry...

  • by perseverer,

    perseverer perseverer Oct 29, 2013 4:19 PM in response to John Galt
    Level 1 (0 points)
    Oct 29, 2013 4:19 PM in response to John Galt

    I'm quite sure that someone has put a keylogger on my macbook pro. I followed the directions here: https://discussions.apple.com/thread/4243511 And I came up with the following. Does anyone see any keylogger info here? Please include any helpful info, like links to identify the culprit. Thanks

     

    https://discussions.apple.com/message/2644034?searchText=keylogger#2644034

    --------------------

     

     

     

    Lelies-MacBook-Pro:~ healthyinspiration

     

    Password:

    Sorry, try again.

    Password:

    1. com.wdc.WDSmartWareServer
    2. com.wdc.WDDMservice
    3. com.microsoft.office.licensing.helper
    4. com.mcafee.virusscan.fmpd
    5. com.mcafee.ssm.ScanManager
    6. com.mcafee.virusscan.ssm.ScanFactory
    7. com.mcafee.ssm.Eupdate
    8. com.google.keystone.daemon
    9. com.adobe.fpsaud

    Lelies-MacBook-Pro:~ healthyinspiration$

     

    Lelies-MacBook-Pro:~ healthyinspiration$

     

    ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null/Library/Components:

     

    /Library/Extensions:

     

    /Library/Frameworks:

    1. AEProfiling.framework
    2. AERegistration.framework
    3. AVEngine.framework
    4. AudioMixEngine.framework
    5. NyxAudioAnalysis.framework
    6. PluginManager.framework
    7. ScanBooster.framework
    • VirusScanPreferences.framework
    1. iTunesLibrary.framework

     

    /Library/Input Methods:

     

    /Library/Internet Plug-Ins:

    1. AdobeAAMDetect.plugin

    Flash Player.plugin

    1. JavaAppletPlugin.plugin

    Quartz Composer.webplugin

    QuickTime Plugin.plugin

    1. SharePointBrowserPlugin.plugin
    2. SharePointWebKitPlugin.webplugin
    3. flashplayer.xpt
    4. googletalkbrowserplugin.plugin

    npgtpo3dautoplugin.plugin

    1. nsIQTScriptablePlugin.xpt

    o1dbrowserplugin.plugin

     

    /Library/Keyboard Layouts:

     

    /Library/LaunchAgents:

    1. com.adobe.AAM.Updater-1.0.plist
    2. com.adobe.CS4ServiceManager.plist
    3. com.google.keystone.agent.plist
    4. com.mcafee.menulet.plist
    5. com.mcafee.reporter.plist

     

    /Library/LaunchDaemons:

    1. com.adobe.fpsaud.plist
    2. com.apple.remotepairtool.plist
    3. com.google.keystone.daemon.plist
    4. com.mcafee.ssm.Eupdate.plist
    5. com.mcafee.ssm.ScanFactory.plist
    6. com.mcafee.ssm.ScanManager.plist
    7. com.mcafee.virusscan.fmpd.plist
    8. com.microsoft.office.licensing.helper.plist
    9. com.wdc.WDDMservice.plist
    10. com.wdc.WDSmartWareServer.plist

     

    /Library/PreferencePanes:

    Flash Player.prefPane

     

    /Library/PrivilegedHelperTools:

    1. com.microsoft.office.licensing.helper

     

    /Library/QuickLook:

    1. iWork.qlgenerator

     

    /Library/QuickTime:

    1. AppleIntermediateCodec.component

    AppleMPEG2Codec.component

     

    /Library/ScriptingAdditions:

    Adobe Unit Types.osax

     

    /Library/Spotlight:

    Microsoft Office.mdimporter

    1. iWork.mdimporter

     

    /Library/StartupItems:

    cma

     

    /etc/mach_init.d:

     

    /etc/mach_init_per_login_session.d:

     

    /etc/mach_init_per_user.d:

     

    Library/Address Book Plug-Ins:

     

    Library/Fonts:

     

    Library/Input Methods:

    .localized

     

    Library/Internet Plug-Ins:

    Google Earth Web Plug-in.plugin

    1. Picasa.plugin

     

    Library/Keyboard Layouts:

     

    Library/LaunchAgents:

    1. com.apple.CSConfigDotMacCert-healthyinspiration@me.com-SharedServices.Agent.plist

     

    Library/PreferencePanes:

    Lelies-MacBook-Pro:~ healthyinspiration$

    Lelies-MacBook-Pro:~ healthyinspiration$

     

    Lelies-MacBook-Pro:~ healthyinspiration$ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null

    iTunesHelper, HP Scheduler

    Lelies-MacBook-Pro:~ healthyinspiration$

    Lelies-MacBook-Pro:~ healthyinspiration$

Page 1 Next