>>108843
>>108818
>>108741
>>108736
>>108697
>>108667
brews,
I don't think it is all in my head. Check it, the rubber ducky started doing that shit again, like i detailed above. SOOOO, I used old admin account to reset all passwords & remove user account. THEN, created unpriv user and rebooted. Then, created new admin account with old admin rights, removed old admin. Reset all permissions, everywhere to non execute. Then set it to nobody & no group.
But, here's the kicker. It lagged at boot and did a grey screen flash. Then when logging in under old account, it "reinitialised" as if never logged in before. That all seems sloppy, so could be FUD.
But, this is what is making me believe the coolaid.
After first boot (rebooting after the logs posted above):
ignored is_io_service_close(0x1000003b2,IOHIDParamUserClient)
Sandbox: coreduetd(80) deny(1) file-read-metadata /usr/libexec
Sandbox: coreduetd(80) deny(1) file-read-metadata /usr/libexec
Sandbox: airportd(69) deny(1) file-read-metadata /usr
Sandbox: iconservicesagen(339) deny(1) file-write-mode /private/var/folders/7t/pdc5pfms0f3gtggy1g_h08440000gv/C/com.apple.iconservices
Sandbox: storeaccountd(370) deny(1) file-write-create /Users/apple/Library/Caches/com.apple.spotlight
Sandbox: storeaccountd(370) deny(1) file-write-create /Users/apple/Library/Caches/com.apple.spotlight
Sandbox: softwareupdated(388) deny(1) system-fsctl 682f
Sophos Anti-Virus on-access kext activated
then, after rebooting a second time, from that time:
ignored is_io_service_close(0x1000003d1,IOHIDParamUserClient)
Sandbox: coreduetd(81) deny(1) file-read-metadata /usr/libexec
Sandbox: storeaccountd(341) deny(1) file-write-create /Users/apple/Library/Caches/com.apple.spotlight
Sandbox: storeaccountd(341) deny(1) file-write-create /Users/apple/Library/Caches/com.apple.spotlight
Sandbox: airportd(70) deny(1) file-read-metadata /usr
Sandbox: CalendarAgent(313) allow(0) mach-register com.apple.CalendarStore.lock.init
Sandbox: softwareupdated(368) deny(1) system-fsctl 682f
Sophos Anti-Virus on-access kext activated
Sandbox: systemsoundserve(282) deny(1) file-read-metadata /private/var/root
and lastly, booth of those dmesgs produce this at the start:
e-flags /private/var/run/diagnosticd/dyld_shared_cache_x86_64.map
Sandbox: launchd(1) System Policy: deny(1) file-write-unlink /private/var/run/diagnosticd/dyld_shared_cache_x86_64.map
Sandbox: launchd(1) System Policy: deny(1) file-write-flags /private/var/run/dyld_shared_cache_x86_64
Sandbox: launchd(1) System Policy: deny(1) file-write-unlink /private/var/run/dyld_shared_cache_x86_64
Sandbox: launchd(1) System Policy: deny(1) file-write-flags /private/var/run/dyld_shared_cache_x86_64.map
Sandbox: launchd(1) System Policy: deny(1) file-write-unlink /private/var/run/dyld_shared_cache_x86_64.map
Sandbox: launchd(1) System Policy: deny(1) file-write-flags /private/var/run/diagnosticd/dyld_shared_cache_i386
Sandbox: launchd(1) System Policy: deny(1) file-write-unlink /private/var/run/diagnosticd/dyld_shared_cache_i386
Sandbox: launchd(1) System Policy: deny(1) file-write-flags /private/var/run/diagnosticd/dyld_shared_cache_i386.map
Sandbox: launchd(1) System Policy: deny(1) file-write-unlink /private/var/run/diagnosticd/dyld_shared_cache_i386.map
Sandbox: launchd(1) System Policy: deny(1) file-write-flags /private/var/run/diagnosticd/dyld_shared_cache_x86_64
Sandbox: launchd(1) System Policy: deny(1) file-write-unlink /private/var/run/diagnosticd/dyld_shared_cache_x86_64
Sandbox: launchd(1) System Policy: deny(1) file-write-flags /private/var/run/diagnosticd/dyld_shared_cache_x86_64.map
Sandbox: launchd(1) System Policy: deny(1) file-write-unlink /private/var/run/diagnosticd/dyld_shared_cache_x86_64.map
plus, on the third reboot, a new IP connection:
>199.77.32.45