Unknown Malware on OS X 10.9

I have done everything i can possibly think of to try to remove malware / adware from my computer, with no success...
1. Adware Medic (didn't find anything)
2. changed DNS settings (to no avail)
3. reinstalled OS X 10.9 (and initially brought back my time machine backup - still no fix)
4. reinstalled OS X 10.9 (clean install - and still having problems)
5. Ran ClamXav and didn't find any viruses
What am i missing? Why would i still be having problems after doing a clean install and also changing my DNS settings?

tool wrote:
I have done everything i can possibly think of to try to remove malware / adware from my computer, with no success...
What am i missing? Why would i still be having problems after doing a clean install and also changing my DNS settings?
You are simply missing the fact that you don't have malware and should stop wasting your time looking for it.
Start a new discussion topic describing what issues you are having in as much detail as possible with screen-shots to show anything strange you are seeing. It is never a good idea to jump to the conclusion that malware is the cause of Mac issues. It almost never is.

Similar Messages

  • I asked a qusetion re a GData message about malware. I now have a message saying that GData has found unknown malware in Firefox. The fingerprint is 9fdc7ef8. Anyone else getting this?

    The message says not to use passwords for sensitive sites like banking until issue is reolved

        Hi GeoffPrice
    I'm sorry to hear your getting alerts that are incorrect. Let's get to the bottom of this. What zip code are you in? Are any other devices having the same issue on your account?
    JoeL_VZW
    Follow us on Twitter @VZWSupport

  • Adware on my Mac?

    Hi all,
    I think I might have a big problem, and I'm scared it will totally disable my computer, or I might have already lost important information.
    I first noticed the problem when I went to sign in on my login screen and my password wouldn't work. I thought I might've typed it in wrong so I tried a few more times, but then I realized where it used to say "My Name's Computer" it now says "adware adware's Computer". Uh oh.
    I managed to log on without a password just by clicking log on with out a password. Now when I go to use Safari, for the first few actions it want's me to enter my Keychain password, which I obviously did not give. I have tried googling the problem with no success. I have check the Activity Monitor for the bad processes that people suggested like MacDefender etc, but I don't see anything that looks (obviously) out of place. But maybe because that is because I don't really know what to look for.
    Any help would be greatly appreciated!!!
    I am running Mac OSX 10.4 (old I know)
    Thanks,
    Dave

    davevresk wrote:
    Hey, so would I be able to back up some important files to an external drive, or can that damage my drive by plugging it in to the computer with some sort of unknown malware on it?
    Here's some guidance Linc Davis has given out in the past to people in a similar predicament and you might find some of these items useful:
    I suggest you take the following steps immediately:
    1. Back up all data to at least two different devices, if you haven't already done so.
    2. Boot from your recovery partition (if running Mac OS X 10.7 or later) or your installation disc (if running an earlier version of the Mac OS), launch Disk Utility, and erase the startup volume. This action will destroy all data on the volume, so you must be sure of your backups.
    3. Install the Mac OS.
    4. Reboot and go through the initial setup process to create an account with the same name as your old one. Don’t import anything from your backups at this stage.
    5. If running Mac OS X 10.6.x or earlier, run Software Update. You may have to run it more than once to fully update your system.
    6. Restore the contents of the top-level subfolders of your home folder except “Library” from the most recent backup. The Library folder may contain components of the malware. This is where restoring becomes difficult, and I can only give general guidelines.
    Of the top-level subfolders of Library that are visible in the Finder, I think it’s safe to restore the following, which contain most of the data you’d want to keep:
    Audio
    Calendars
    ColorSync
    Colors
    Favorites
    FontCollections
    Fonts
    Images
    Keychains
    Mail (except Mail/Bundles)
    Safari (except Safari/Extensions)
    The following are not safe to restore, at least not in full:
    Application Support
    Internet Plug-Ins
    LaunchAgents
    Preferences
    If you have Time Machine snapshots of these folders that you’re sure are older than the infection, you can restore from one of those snapshots.
    Folders not mentioned above may or may not be safe. If in doubt, don’t restore them. Don’t restore any hidden files or folders, no matter where they are. Hidden files should be considered suspicious.
    7. If you’re running Mac OS X 10.5.8 or earlier, launch Safari and select Safari ▹ Preferences… ▹ Security from the menu bar. Uncheck the box labeled Enable Java. Because of known bugs, Java in those OS versions is unsafe to use on the Internet. (Note: I’m not referring to JavaScript, which is unrelated to Java, despite the similar names.) If you’re running Mac OS 10.6.8 or later, you should still disable the Java web plugin unless you really need it. Few websites have legitimate Java content nowadays. If you encounter one that does, enable Java temporarily.
    8. Change every Internet password you have, starting with banking passwords. Check all financial accounts for unauthorized transactions. Take this step only after you’ve secured your system in the preceding steps, not before.
    9. Reinstall your third-party software from fresh downloads or original media, not from backups which may be contaminated.
    10. If you use any third-party web browsers, disable Java in their preferences. As with step 7, this step is mandatory if you’re running any version of Mac OS X older than 10.6. Otherwise it’s optional, but recommended.

  • Error on ALL CS3 Products: "You cannot use this product at this time..."

    Hello all,
    I woke up this morning and attempted to launch Adobe Photoshop CS3. I received the following error:
    "You cannot use this product at this time. You must repair the problem by uninstalling..."
    At the same time I tried opening Photoshop, my Antivirus application (ESET NOD 32 Antivirus) indicated that it found a "threat" named AdobeLM_libFNP.dll.
    I then tried opening DreamWeaver CS3. Same issue. Also got another threat notification from ESET NOD 32.
    Non CS3 products (Photoshop CS2, Illustrator 10) do not appear to be affected.
    I've already referred to the TechNote for this issue. I've tried all of the solutions, except for uninstalling and reinstalling the software.
    http://kb.adobe.com/selfservice/viewContent.do?externalId=kb401528&sliceId=1
    I really don't have the time today to uninstall and reinstall all of my Adobe apps. I'm hoping there is another solution.
    I'm running a complete system/virus scan right now and its coming up with threats left and right... all of them are Adobe-related w/file names like "AdobeDeviceCentralAll1.cab"
    Can anyone help?

    >At the same time I tried opening Photoshop, my Antivirus application (ESET NOD 32 Antivirus) indicated that it found a "threat" named AdobeLM_libFNP.dll.
    if you're SURE that's a virus, you'll have to reinstall the full app. my guess is you AV app is a little too aggressive in it's scanning and it stopping the adobe license manager (AdobeLM) from running so you can't run your apps.
    having heard of adobe, but never heard of est nod, i'd trust adobe 1st... try another virus scanner. for example avg (free or paid) or kaspersky, panda, mcaffe, symantec, etc.
    hmm googling i found a pcweek review. they say it's great at catching "unknown" viruses (proactive protection) but "less than stellar" at stopping and disenfecting lots of other malware. so it may be thinking because of the behaviour of the ALM, nod32 thinks it's caught an unknown virus.
    http://www.pcworld.com/article/id,130906/article.html
    >When it comes to proactive protection, Eset's NOD32 was the hands-down winner in "Virus Stoppers," our eight-program antivirus roundup. In our tests, it caught 79 percent of unknown malware samples when using one-month-old signature files. The next-closest program, BitDefender Antivirus 10, came in with a distant 61 percent
    >NOD32's overall malware detection rate wasn't stellar, however. When pitted against AV-Test.org's nearly 900,000-strong "zoo" of Trojans, viruses, and other malware, NOD32 caught only 90 percent, compared to the 96 percent rate of top performers Kaspersky Anti-Virus 6, Symantec Norton AntiVirus 2007, and BitDefender Antivirus 10. It fared surprisingly poorly with 32-bit Windows viruses (approximately 1 in 11 samples in the zoo), catching only 73 percent.

  • New Cridex Banking Trojan variant Combines Data Stealer and Email Worm

    Hi Team,
    In an effort to infect large number of people, cybercriminals have developed a new malicious software program that contains functionality to spread itself quickly.
    Geodo, a new version of the infamous
    Cridex (also known as Feodo or Bugat) banking information stealing Trojan works in conjunction with a worm that sends out emails automatically to continue its self-spreading infection method, effectively turning each infected
    Windows system in the botnet for infecting new targets, Seculert warned.
    Ref:-
    http://www.seculert.com/blog/2014/07/geodo-new-cridex-version-combines-data-stealer-and-email-worm.ht
    Here again, Our Securiry team wanted to know whether FEP able to detect this Malware or not.
    Please let us know your update on this.
    Regards
    Sudam Bisi
    Cognizant

    There are many ways which FEP protects you against different kind of malwares, for example using heuristic detection and behavior monitoring , it is possible to detect even unknown malwares. The issue with new malware and cybercriminals is an on-going issue
    and for this reason you have regular updates.
    If you have sample of this threat, you may submit it to Microsoft Malware Protection Center:
    http://cyberdefend.wordpress.com/2012/08/11/submit-sample-to-microsoft-malware-protection-center/
    https://www.microsoft.com/security/portal/submission/submit.aspx

  • What is best 2015 antivirus program for my iMac

    Which antivirus program is recommended for my 2011 iMac running OSX Yosemite 10.10.1?

    thedjjams wrote:
    There are quite a few Mac virus / malware that has come out over the years.
    A few. A total of 51 in all the years Mac OS X has existed. All of which are currently extinct, because they either won't work on current versions of Mac OS X or are blocked by the anti-malware features of recent versions of Mac OS X. There is no currently known malware capable of infecting Mac OS X, and though the possibility of unknown malware exists, anti-virus software can't protect you against that.
    I personally have used Sophos AntiVirus for Mac for the past few years.
    I used to recommend Sophos to people who insisted on using anti-virus software, but it is no longer as low-profile as it used to be. Sophos has been causing more problems for Mac users recently, and I no longer recommend its use.
    I am including some links on the matter below.
    It's important to keep a few things in mind with regard to those links. The Tom's Guide article is very light on actual information about how they evaluated the software they reviewed, and the site is littered with advertising, including some for anti-virus software. That review should be considered potentially biased.
    Similarly, the AVTest site receives payment from anti-virus companies for the testing they do, so there's definitely potential for bias. Their testing of malware detection seems to be pretty close to my own results, so that's probably good data... but, it's only one data point. My own testing data has been routinely misinterpreted by people who believe that because Avast tops the detection rate list, that makes it good. (In actuality, I strongly recommend against Avast for a variety of reasons.) Paying too much attention to just detection, or just how fast a Mac can copy files while anti-virus is installed, and not to other issues is a very serious error.
    The Intego article you linked to is a bad link, but if you Google it, you'll find that some of the information there is good, but other points are weak at best. One points out that some malware has gotten past the anti-malware features of Mac OS X, without mention of the fact that 1) that malware also got past anti-virus software at the time, or 2) those anti-malware features were still not entirely complete at the time. Another point is a straw man argument. (I've never seen anyone arguing that Mac malware doesn't affect "real people," so arguing that it does is meaningless.)
    Now, let's consider something else... because both Mac OS X and anti-virus software are not strong against brand new threats, and because they are also not strong against things like adware (which is not really malware), neither one can be relied on for full protection. Yet the installation of anti-virus software is often treated by users as full protection, which leads them to behave in unsafe ways under the false belief that they are safe. Thus, running anti-virus software can actually be more harmful than good!
    For more information, see my Mac Malware Guide.
    (Fair disclosure: I may receive compensation from links to my sites, TheSafeMac.com and AdwareMedic.com.)

  • Linux installing applications requires root password.

    Can anyone explain to me why it is that on Linux, Air
    requires a root password to install an application even if the
    installation directory is specified as somewhere within my own home
    directory?
    That it asks for a root password under such circumstances
    seems very wrong. The application files are being written to my
    home directory, I don't need to be root to write there and I do not
    want files being created in my home directory with root as the
    owner, as Air does when it installs an application.
    Asking for the root password also means that users who have a
    Linux machine that is administered for them by someone else and do
    not have root are unable to install Air applications themselves
    even if the administrator has installed Air on their
    machine.

    First of all, on behalf of myself (and anyone else who has
    been wondering about this particular detail of Adobe AIR) let me
    thank you for your helpful reply. This does still leave me with a
    couple of questions, however...
    quote:
    Originally posted by:
    Ashutosh Sharma
    AIR applications are similar to regular native applications -
    they install as native rpm/deb packages. This requires access to
    the rpm/deb system database (e.g. rpm database lock). And this is
    required even if the installation folder is chosen to be one that
    is owned by the current non-root user. In addition, with root
    privileges, it's also possible to install applications to a
    location that is accessible to other users on the system.
    I have confirmed for myself the accuracy of this information
    and I thank you for pointing it out. While this does make some
    sense on the surface, it does leave me wondering something about
    the security level of this install process. When I install
    applications from my Linux distribution's package sources, I have
    GPG (or PGP) cryptographic key signatures ensuring that all the
    packages are un-altered from their original form on the
    distribution's package servers, and a team of programmers assuring
    me that the code of these packages are (at least somewhat) safe as
    far as they are able to tell. I am thus far unable to find
    information leading me to believe that there is similar assurance
    that I am not willingly installing unknown malware (keystroke
    logger, spyware, etc.) disguised as a desktop widget (for example)
    when installing Adobe AIR applications. As a code savvy user, I can
    personally download and examine the code of many AIR apps to ensure
    their safety myself before installing, but what about users who
    understand code as well as they understand Martian language or
    ancient Egyptian hieroglyphs? Is there any assurance process in
    place for the average user similar to that of native distro
    packages? If so, can anyone point me to where that is discussed on
    the Adobe pages?
    Also, as an aside note; root privileges are not technically
    REQUIRED in order to install an RPM package in a location which the
    user already has write access to, as I personally have on many
    occasions installed source code packages (SRPM) from my
    distribution's package manager in my home folder while logged in as
    a normal user (without the use of 'su' or 'sudo' or such) for the
    purpose of building newer versions of the RPM packages which they
    correspond to.
    quote:
    Originally posted by:
    Ashutosh Sharma
    However, do note that when they are launched, AIR
    applications run with the privileges of the user launching the
    application and not root. The primary executables of AIR
    applications (under the bin/ folder in the installation path) do
    not have the setuid bit set. You should not be worried about AIR
    applications running with root privileges, based on the fact that
    their installation required superuser access - the two are
    completely independent.
    This does still go back to the original point about the
    security of the code itself which is being installed in the first
    place. What quality assurance process is in place (beyond the star
    ratings system on the application showcase site) to ensure that
    malware was not installed (as root) and then happily being run by
    all the users of a system while blissfully unaware of the capture
    of their passwords or other personal information? (Again, an
    example, and not the only such possible worry.) If such an
    assurance system
    is already in place, where can I (and other AIR users) read
    more about it?
    The reasons for this concern should be obvious when one
    considers that a malicious application does not necessarily need to
    be run as root to still do a great deal of damage on a system and a
    sufficiently sneaky malware application could possibly even
    obtain root privileges once installed on a system through
    some other privilege escalation exploit. As an administrator of
    multiple systems and networks, I have to be cautious about which
    applications I allow on to a system or network for this very
    reason.
    Please be aware that I am not making these points and asking
    these questions to be a "troublemaker" or to shoot down the
    achievements of the AIR team, or Adobe. To the contrary, I am very
    impressed by the technology that I've seen so far and would
    very much like to see AIR become and stay a genuinely useful
    part of the web ecosystem on all platforms. As a matter of fact,
    I'm personally reading a few different resources currently about
    how to develop AIR applications in anticipation of satisfactory
    answers to my few remaining concerns about AIR security worries. ;)
    P.S.: If this forum was the wrong place to be discussing
    these specific types of issues and concerns, please feel free to
    point me toward a better place where such things should be better
    covered and where like-minded individuals and groups might either
    continue the discussion or resolve / close this concern entirely.
    An IRC channel where AIR devs hang out maybe, or perhaps another
    Adobe forum where security concerns are discussed, etc.? :)
    Anyhow, sorry about the long rambling post. Thank you to
    Ashutosh Sharma for your initial reply to this thread, and thank
    you in advance to whoever may reply further and bring final
    resolution to any remaining worries I and others may have regarding
    these and similar potential security concerns. :)

  • Have had to re-download Mozilla due to malware - final step of installation asks if I will allow unknown publisher to make changes to computer - click YES and get message my computer is infected with malware - click NO and cannot open Mozilla

    Long story short, unwisely allowed unknown publisher to make changes to my computer (which I thought was related to my anti-virus protection) last night. In the process, seems I allowed malware (called antivirus8). Neither Explorer or Mozilla were available - seemed to have been wiped out by antivirus8 thing. Explorer came back up (with favorites still intact) after doing full scans and a few other things...but Mozilla did not. Uninstalled Mozilla and re-downloaded. Final step of installation asked if I wanted to allow an unknown publisher (and I'm sorry to say I don't remember exactly what it was...something with safe in the name, I think) to make changes to my computer. Clicked NO and still not able to access Mozilla...redid and clicked YES and immediately got message that my computer was infected with malware. Have used Mozilla for years...hate just having Explorer. Anti-virus program is Kaspersky...ran full scan and it did not detect a thing...so I really don't know what happened!

    Try running several malware scanners to see if Kaspersky missed anything. It is best to run several as each will pick up things that the others miss. Some scanners you can try are:
    * [http://www.malwarebytes.org/mbam.php Malwarebytes]
    * [http://www.superantispyware.com/ SUPERAntiSpyware]
    * [http://www.lavasoft.com/products/ad_aware_free.php Ad-Aware]
    * [http://www.microsoft.com/windows/products/winfamily/defender/default.mspx Windows Defender]
    * [http://www.safer-networking.org/en/home/index.html Spybot S&D]
    If the above malware scanners do not find any malware or can not clear it, you should consider posting in one of these forums for specialized malware removal help:
    * http://forums.spybot.info/
    * http://www.spywarewarrior.com/index.php
    * http://forum.aumha.org/
    * http://www.bleepingcomputer.com/forums/
    * http://www.spywareinfoforum.com/

  • An unknown excel file has appeared on my desktop. It cannot be deleted and I cannot get any information about it. Is this malware?  How can I get rid of it?

    An unknown excel file has appeared on my desktop. It cannot be deleted and I cannot get any information about it.
    Is this malware?  How can I get rid of it?

    Hello Jeff,
    Thanks very much for your reply.  I looked over the article you mentioned, but I have tried all of these methods, but only get the response "The item “29394D00” can’t be moved to the Trash because it can’t be deleted."  Similarly, I cannot Get Info on the file.  This is why I'm so concerned, it just appeared on my desktop, but I cannot touch it, or open it or delete it...
    If you have any more tricks up your sleeve, I'd love to hear about them...
    Derek

  • Unknown auto typing. Malware?

    My Macbook started to autotype by itself (as if you had the space bar pressed all the time).
    This happened at first with random letters, and finally with all users in all contexts, typing spaces continuously. Even at restart in the login window, with no users still logged in. I could not even type my password, as the spaces kept coming in!
    I could not identify a process, daemon or script that was causing it, as it was nearly impossible to even type my admin password.
    The solution was to reinstall OSX 10.5 with my original disks, preserving the accounts and settings. Everything went back to normal, but I'm still nervous about not having found the root cause.
    It's a brand new MacBook with latest updates, and, yes, I downloaded and run some utilities from the Internet, as I always do. I doubt is malware, but it may be.
    My questions are:
    1)Anyone ever experienced something like this?
    2)Any idea on how to identify/pinpoint/log what's going on if the symptoms start again? I used Activity Monitor and the Console but could not find anything obvious there.
    Thanks!

    Welcome to Apple Discussions!
    The most common cause is dust on the keyboard or accidentla keyboard depression from the palm of your hand. The next most common cause is an errant Universal Access setting being setup by an accidental keyboard stroke. Check the Universal Access shortcuts in Apple menu -> System Preferences -> Universal Access to see if it is likely any of those were depressed, or Apple menu -> System preferences -> keyboard and mouse -> full keyboard access shortcuts.
    Sometimes if you have speech recognition turned on a keystroke can be mapped to another keyboard command by accident.
    If iChat Screen Sharing was enabled in a certain chat, that gives access to someone else to access your keyboard directly and act on your machine. But you have to give them permission for that to happen. Same with certain VPN and VNC programs and Remote Access programs.
    As there are no known Mac OS X viruses in the wild and only trojan horses, you'd be the first this has happened to if none of these solutions appears to solve it.
    Message was edited by: a brody

  • My efforts to remove malware from a network external hard drive connected to my Intel based iMac is now causing programs to hang when I try to open them.

    I own an iMac, recently updated with OSX 10.75. It is the core computer on a home network shared with an iPad, Apple TV, two network printers,my wife's laptop, two iPhone, a BlackBerry and a BlackBerry Playbook. I am experiencing three if not four problems that are overwhelming.
    My original problem is associated with Windows emails files or documents  stored on my external network  hard drive. One or more has malware and is sending malware laced files across the Internet to points unknown.  As someone pointed out in a forum my iMac may be hosting,sharing and propagating Windows malware.  I originally used Trend Micro software on my IMac to monitor any viral activity. Two weeks ago I noticed a number of notices from servers around the world saying my message was not undelivered. Since I had sent messages to the people I simply deleted the emails. Next I noticed the emails on my BlackBerry and my BlackBerry playbook.I configured the Trend to do a complete scan and although it did a complete scan it did not perform a full network scan. It did identify a series of .x27 document files with the same name tbut each had a sequential number. I assumed hat these were the source files that had  sent out the email documents selling Viagara and othernproducts.  I manually deleted thousands of the source documents and the files. This caused some disruption to my computer but it did not produce a hardware or software problem. By following this effort in conjunction with security scans I do believe the malware was activated by Iranian students who were able to activate the malware through my BlackBerry and BlackBerry Playbook.  I learned this from an encounter I had when trying tondelete these files on my computer and my BlackBerry.
    When using my PlayBook after deleting the files from my computer I noticed more messages being returned from servers.  I realized that email accounts connected to my BlackBerry and BB Playbookn were not protected from this problem. As I searched for remedies I learned about turning on the firewall in the previous version of Lion but that did not stop the BlackBerry problem. Each time I deleted a source file on my computer more documents were released. I eventually received McAfee from my ISP. It provided security on the entire network. My first full scan of my external drive identified two malware files. One of them was associated with the Cialis ad the other was from a firm in the Middle East called ADP.  it could not remove the latter file.
    Moreover each time I attempted to remove the source file from my hard drive a file labeled A239A076F would show up on my Blackberry.  As I removed them thousands of these files would show up.  Ultimately I eventually disconnected the external hard drive and removed the battery from the phone and not use the email accounts these messages had used to enter my iMac.  I am contacting ATT about BlackBerry data security and switching to a different phone for business purposes. I will probably change to an iPhone or Android phone for business purposes.  I am also looking at ways to resolve the malware on that drive. There are a number of business and personal files on thatbdrive that I hope to keep. I dread having to pay McAfee to configure the software to eradicate the malware.
    Moving on...last week I updated my iMac to 10.75. It simultaneously updated every Apple based program as promised. It did not update the non-Apple programs.  I am not an IT professional and assumed that it had done so.  On Saturday I attempted to download a file associated with my router extender using my untethered Playbook and BlackBerry desktop software. The program hung. I attempted a reboot and it reopened with the hung program.  It created an alias file on the desktop.  My inclination led to put the alias file in the trash can and delete it. My computer did not respond well to that action. It has been rebooted with Cmd-s-esc tens of time to see if that would activate a file check. It did not. I was able to run a disk utility check. And in spite of the hung process it eventually said the drive was okay.
    Long story in a nutshell. My iMac is responding as if it is looking for a subprogram to complete its a function. Or it is attempting to finish the BlackBerry operation it began on Saturday. I hope this makes sense to someone and the know how I can restore functionality to my iMac.
    Thank you.

    I think the McAfee suite will do the trick when I pay them a one-time fee of $69 or $179 for a year for unlimited support.
    Your call of course but IMO a waste of money. Please read this first:
    There are many forms of ‘Malware’ that can affect a computer system, of which ‘a virus’ is but one type, ‘trojans’ another. Using the strict definition of a computer virus, no viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions. The same is not true of other forms of malware, such as Trojans. Whilst it is a fairly safe bet that your Mac has NOT been infected by a virus, it may have another security-related problem, but more likely a technical problem unrelated to any malware threat.
    You may find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful:
    https://discussions.apple.com/docs/DOC-2435
    The User Tip (which you are welcome to print out and retain for future reference) seeks to offer guidance on the main security threats and how to avoid them.
    More useful information can also be found here:
    http://www.reedcorner.net/mmg/

  • Mid 2012 macbook pro has become slow and has a malware on it i can't locate

    I have a Faux flash player Malware window pops up randomly, used bit defender and activity monitor to try to find it with no luck.
    Im looking for a free way to fix that guy.
    RAM also seems to always be heavily used even with little open and running, windows lag when switching between Chrome windows and often gets overloaded on Vectorworks 2013 now, If i can get the flash update thing taken care up I may upgrade to 2X 8gb RAM if that can't be figured out to expedite
    (Activity Monitor currently shows 8gb physical mem with 7.97 used, wasn't a problem often before Yosemite)
    Heres my Etrecheck
    Problem description:
    macbook pro 13” mid 2012 running slowly and has faux flash player update malware
    EtreCheck version: 2.1.8 (121)
    Report generated March 7, 2015 at 12:55:35 PM PST
    Download EtreCheck from http://etresoft.com/etrecheck
    Click the [Click for support] links for help with non-Apple products.
    Click the [Click for details] links for more information about that line.
    Hardware Information: ℹ️
        MacBook Pro (13-inch, Mid 2012) (Technical Specifications)
        MacBook Pro - model: MacBookPro9,2
        1 2.9 GHz Intel Core i7 CPU: 2-core
        8 GB RAM Upgradeable
            BANK 0/DIMM0
                4 GB DDR3 1600 MHz ok
            BANK 1/DIMM0
                4 GB DDR3 1600 MHz ok
        Bluetooth: Good - Handoff/Airdrop2 supported
        Wireless:  en1: 802.11 a/b/g/n
        Battery Health: Normal - Cycle count 1035
    Video Information: ℹ️
        Intel HD Graphics 4000
            Color LCD 1920 x 1200
    System Software: ℹ️
        OS X 10.10.2 (14C109) - Time since boot: one day 0:49:42
    Disk Information: ℹ️
        TOSHIBA MK7559GSXF disk0 : (750.16 GB)
            EFI (disk0s1) <not mounted> : 210 MB
            Recovery HD (disk0s3) <not mounted>  [Recovery]: 650 MB
            Macintosh HD (disk1) / : 748.93 GB (297.62 GB free)
                Encrypted AES-XTS Unlocked
                Core Storage: disk0s2 749.30 GB Online
        HL-DT-ST DVDRW  GS31N 
    USB Information: ℹ️
        Apple Inc. iPhone
        Apple Inc. FaceTime HD Camera (Built-in)
        Seagate FreeAgent Go 120.03 GB
            EFI (disk2s1) <not mounted> : 210 MB
            Untitled (disk2s2) /Volumes/Untitled : 119.69 GB (104.46 GB free)
        Apple Inc. Apple Internal Keyboard / Trackpad
        Apple Computer, Inc. IR Receiver
        Apple Inc. BRCM20702 Hub
            Apple Inc. Bluetooth USB Host Controller
    Thunderbolt Information: ℹ️
        Apple Inc. thunderbolt_bus
    Gatekeeper: ℹ️
        Anywhere
    Kernel Extensions: ℹ️
            /Library/Extensions
        [not loaded]    com.symantec.kext.SymAPComm (12.7.1f4 - SDK 10.8) [Click for support]
        [loaded]    com.symantec.kext.internetSecurity (5.4f4 - SDK 10.8) [Click for support]
        [loaded]    com.symantec.kext.ips (3.9.2f1 - SDK 10.8) [Click for support]
    Launch Agents: ℹ️
        [failed]    com.adobe.CS4ServiceManager.plist [Click for support]
        [loaded]    com.oracle.java.Java-Updater.plist [Click for support]
        [loaded]    com.symantec.errorreporter-periodicagent.plist [Click for support]
        [running]    com.symantec.uiagent.application.plist [Click for support]
    Launch Daemons: ℹ️
        [loaded]    com.adobe.fpsaud.plist [Click for support]
        [loaded]    com.ea.origin.ESHelper.plist [Click for support]
        [loaded]    com.oracle.java.Helper-Tool.plist [Click for support]
        [failed]    com.symantec.errorreporter-periodic.plist [Click for support]
        [loaded]    com.symantec.liveupdate.daemon.ondemand.plist [Click for support]
        [failed]    com.symantec.liveupdate.daemon.plist [Click for support]
        [not loaded]    com.symantec.nav.migrateqtf.plist [Click for support]
        [running]    com.symantec.sharedsettings.plist [Click for support]
        [failed]    com.symantec.symdaemon.plist [Click for support] [Click for details]
    User Launch Agents: ℹ️
        [failed]    com.facebook.videochat.[redacted].plist [Click for support]
        [loaded]    com.google.keystone.agent.plist [Click for support]
        [running]    com.spotify.webhelper.plist [Click for support]
    User Login Items: ℹ️
        iTunesHelper    Application  (/Applications/iTunes.app/Contents/MacOS/iTunesHelper.app)
        SpeechSynthesisServer    Application  (/System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks /SpeechSynthesis.framework/Versions/A/SpeechSynthesisServer.app)
        Dropbox    Application Hidden (/Applications/Dropbox.app)
    Internet Plug-ins: ℹ️
        Silverlight: Version: 5.1.30514.0 - SDK 10.6 [Click for support]
        FlashPlayer-10.6: Version: 16.0.0.305 - SDK 10.6 [Click for support]
        Flash Player: Version: 16.0.0.305 - SDK 10.6 [Click for support]
        QuickTime Plugin: Version: 7.7.3
        JavaAppletPlugin: Version: Java 8 Update 31 Check version
        Default Browser: Version: 600 - SDK 10.10
    User internet Plug-ins: ℹ️
        Picasa: Version: 1.0 - SDK 10.4 [Click for support]
    3rd Party Preference Panes: ℹ️
        Flash Player  [Click for support]
        Java  [Click for support]
        Norton\nQuickMenu  [Click for support]
    Time Machine: ℹ️
        Time Machine not configured!
    Top Processes by CPU: ℹ️
             3%    WindowServer
             3%    sysmond
             1%    DesktopServicesHelper
             1%    Safari
             0%    mds_stores
    Top Processes by Memory: ℹ️
        369 MB    BitdefenderVirusScanner
        206 MB    iPhoto
        180 MB    Finder
        163 MB    WindowServer
        160 MB    softwareupdated
    Virtual Memory Information: ℹ️
        376 MB    Free RAM
        4.13 GB    Active RAM
        2.77 GB    Inactive RAM
        1.12 GB    Wired RAM
        95.19 GB    Page-ins
        255 MB    Page-outs
    Diagnostics Information: ℹ️
        Mar 6, 2015, 07:10:16 PM    /Library/Logs/DiagnosticReports/SymDaemon_2015-03-06-191016_[redacted].crash
        Mar 6, 2015, 01:15:00 PM    /Library/Logs/DiagnosticReports/BitdefenderVirusScanner_2015-03-06-131500_[reda cted].cpu_resource.diag [Click for details]
        Mar 6, 2015, 08:00:36 AM    /Library/Logs/DiagnosticReports/BitdefenderVirusScanner_2015-03-06-080036_[reda cted].cpu_resource.diag [Click for details]
        Feb 27, 2015, 07:53:28 PM    /Library/Logs/DiagnosticReports/Kernel_2015-02-27-195328_[redacted].panic [Click for details]
        Mar 6, 2015, 12:02:22 PM    Self test - passed
        Mar 6, 2015, 11:18:09 AM    /Library/Logs/DiagnosticReports/BitdefenderVirusScanner_2015-03-06-111809_[reda cted].cpu_resource.diag [Click for details]

    The update alerts are fake, and are intended to dupe you into installing malware or disclosing private information so that your identity can be stolen.
    You might get the alerts when visiting a website that has been hacked. Don't visit the site again. If applicable, notify the site administrator of the problem, but don't send email to an unknown party.
    If you get the alerts when visiting more than one well-known website, such as Google, YouTube, or Facebook, then they may be the result of an attack on your router that has caused you to get false results from looking up the addresses of Internet servers. Requests sent to those sites are redirected to a server controlled by the attacker. It's possible, but less likely, that the DNS server used by your ISP has been attacked.
    Back up all data.
    Unlock the Network preference pane, if necessary, by clicking the lock icon in the lower left corner and entering your password. Cllck Advanced, open the DNS tab, and change the server addresses to the following:
              8.8.8.8
              8.8.4.4
    That's Google DNS. Click OK, then Apply.
    In Safari, select
              Safari ▹ Preferences... ▹ Privacy ▹ Remove All Website Data
    and confirm. If you’re using another browser, empty the cache. Test. If the fake update alerts stop, see below. Otherwise, ask for instructions.
    The router's documentation should tell you how to reset it to the factory default state. Usually there's a pinhole switch somewhere in the back. It may be labeled "RESET." Insert the end of a straightened paper clip or a similar tool and press the button inside for perhaps 15 seconds, or as long as the instructions specify.
    After resetting the router, quit the web browser and relaunch it while holding down the shift key. From the Safari menu bar, select
              Safari ▹ Preferences... ▹ Privacy ▹ Remove All Website Data
    and confirm. Do the equivalent if you use another browser. Open the Downloads folder and delete anything you don't recognize.
    Then go through the router's initial setup procedure. I can't be specific, because it's different for every model. The key points are these:
    1. Don't allow the router to be administered from the WAN (Internet) port, if it has that option. Most do.
    2. Set a strong password to protect the router's settings: at least ten random upper- and lower-case letters and digits. Don't use the default password or any other that could be guessed. Save the password in your keychain. Any password that you can remember is weak.
    3. If the router is wireless, or if you have a wireless access point on the network, use "WPA 2 Personal" security and set a different strong password to protect the network. If the router or access point doesn't support WPA 2, it's obsolete and must be replaced.
    During the time the router was compromised, you were redirected to bogus websites. If you ever connected to a secure site and got a warning from your browser that the identity of the server could not be verified, and you dismissed that warning in order to log in, assume that your credentials for the site have been stolen and that the attacker has control of the account. This warning also applies to all websites on which you saw the fake update alerts.
    Check the router manufacturer's website for a firmware update.
    If you downloaded and installed what you thought was a software update, ask for instructions.

  • How to remove blinkx popup adware/malware from Firefox?

    This morning I noticed that my Firefox browser was constantly being interrupted by in-window popups for a site called cdn.blinkx.com/uvp-0.2.1/applications/blank.php. It opens these pages about every 20 seconds, but since updating Firefox it appears to have slowed down. Still, I would like to find the adware responsible and remove it for security reasons. The site itself doesn't appear to do anything - just a blank black page - but it is very annoying and can make the browser almost unusable. I have strong reason to believe this is adware or malware. I have not really done any unusual downloads recently, and my antivirus software ClamXav did not spot it. If anyone could help solve this problem I would be very grateful.

    You installed the "DownLite" trojan, perhaps under a different name. Remove it as follows.
    Malware is constantly changing to get around the defenses against it. The instructions in this comment are valid as of now, as far as I know. They won't necessarily be valid in the future. Anyone finding this comment a few days or more after it was posted should look for more recent discussions or start a new one.
    Back up all data.
    Triple-click anywhere in the line below on this page to select it:
    /Library/LaunchAgents/com.vsearch.agent.plist
    Right-click or control-click the line and select
              Services ▹ Reveal in Finder (or just Reveal)
    from the contextual menu.* A folder should open with an item named "VSearch" selected. Drag the selected item to the Trash. You may be prompted for your administrator login password.
    Repeat with each of these lines:
    /Library/LaunchDaemons/com.vsearch.daemon.plist
    /Library/LaunchDaemons/com.vsearch.helper.plist
    /Library/LaunchDaemons/Jack.plist
    Restart the computer and empty the Trash. Then delete the following items in the same way:
    /Library/Application Support/VSearch
    /Library/PrivilegedHelperTools/Jack
    /System/Library/Frameworks/VSearch.framework
    ~/Library/Internet Plug-Ins/ConduitNPAPIPlugin.plugin
    Some of these items may be absent, in which case you'll get a message that the file can't be found. Skip that item and go on to the next one.
    From the Safari menu bar, select
              Safari ▹ Preferences... ▹ Extensions
    Uninstall any extensions you don't know you need, including any that have the word "Spigot" or "Conduit" in the description. If in doubt, uninstall all extensions. Do the equivalent for the Firefox and Chrome browsers, if you use either of those.
    This trojan is distributed on illegal websites that traffic in pirated movies. If you, or anyone else who uses the computer, visit such sites and follow prompts to install software, you can expect much worse to happen in the future.
    You may be wondering why you didn't get a warning from Gatekeeper about installing software from an unknown developer, as you should have. The reason is that the DownLite developer has a codesigning certificate issued by Apple, which causes Gatekeeper to give the installer a pass. Apple could revoke the certificate, but as of this writing, has not done so, even though it's aware of the problem. This failure of oversight is inexcusable and has compromised both Gatekeeper and the Developer ID program. You can't rely on Gatekeeper alone to protect you from harmful software.
    *If you don't see the contextual menu item, copy the selected text to the Clipboard by pressing the key combination  command-C. In the Finder, select
              Go ▹ Go to Folder...
    from the menu bar and paste into the box that opens by pressing command-V. You won't see what you pasted because a line break is included. Press return.

  • Safari won't open - malware still?

    Hi,
    Safari keeps quitting on start up and I suspect malware. I have tried to remove safari.plist and the files from genieo.com in the library from both the safari folder, preferences folder and LaunchAgent. Still doesn't  work. Help?
    PS. It is not my computer
    ***********Content of safari extensions.plist**************
    bplist00”      WVersion_  Installed Extensions_  Available Updates  ° ÷ 
         _  Removed Default Toolbar Items[Hidden Bars_  Added Non-Default Toolbar Items_  Archive File Name_  Bundle Directory NameWEnabled†††_  Omnibar.safariextz_  Omnibar.safariextension  “    \Updates List_  Last Update Check Time†#A∫  ¿≠øfl   .BDFSs°µÕ’÷◊ÿÌ    
       3 4    =
    ************************************************* Safari Crash report ******************
    Process:               Safari [291]
    Path:                  /Applications/Safari.app/Contents/MacOS/Safari
    Identifier:            com.apple.Safari
    Version:               8.0.2 (10600.2.5)
    Build Info:            WebBrowser-7600002005000000~1
    Code Type:             X86-64 (Native)
    Parent Process:        ??? [1]
    Responsible:           Safari [291]
    User ID:               501
    Date/Time:             2014-12-31 16:09:51.570 +0100
    OS Version:            Mac OS X 10.10.1 (14B25)
    Report Version:        11
    Anonymous UUID:        4E7D78FD-B5E1-75CD-15CB-174CF53AD5C8
    Time Awake Since Boot: 97 seconds
    Crashed Thread:        16
    Exception Type:        EXC_BAD_ACCESS (SIGSEGV)
    Exception Codes:       KERN_INVALID_ADDRESS at 0x0000000000000020
    External Modification Warnings:
    Thread creation by external task.
    VM Regions Near 0x20:
    -->
       __TEXT                 000000010cb22000-000000010cb23000 [    4K] r-x/rwx SM=COW  /Applications/Safari.app/Contents/MacOS/Safari
    Application Specific Information:
    Process Model:
    Multiple Web Processes
    Thread 0:: Dispatch queue: com.apple.Safari.IconController.RetainRelease
    0   com.apple.WebCore               0x000000010ecf7200 ***::HashTableAddResult<***::HashTableIterator<***::String, ***::KeyValuePair<***::String, unsigned int>, ***::KeyValuePairKeyExtractor<***::KeyValuePair<***::String, unsigned int> >, ***::StringHash, ***::HashMap<***::String, unsigned int, ***::StringHash, ***::HashTraits<***::String>, ***::HashTraits<unsigned int> >::KeyValuePairTraits, ***::HashTraits<***::String> > > ***::HashMap<***::String, unsigned int, ***::StringHash, ***::HashTraits<***::String>, ***::HashTraits<unsigned int> >::add<int>(***::String const&, int&&) + 0
    1   com.apple.WebCore               0x000000010e74d62b WebCore::IconDatabase::retainIconForPageURL(***::String const&) + 107
    2   com.apple.WebKit                0x000000010df8ce35 WKIconDatabaseRetainIconForURL + 48
    3   com.apple.Safari.framework      0x000000010cd74506 ___ZN6Safari14IconController22retainIconForURLStringEP8NSString_block_invoke + 59
    4   libdispatch.dylib               0x00007fff8c0c1323 _dispatch_call_block_and_release + 12
    5   libdispatch.dylib               0x00007fff8c0bcc13 _dispatch_client_callout + 8
    6   libdispatch.dylib               0x00007fff8c0c0365 _dispatch_queue_drain + 1100
    7   libdispatch.dylib               0x00007fff8c0c1ecc _dispatch_queue_invoke + 202
    8   libdispatch.dylib               0x00007fff8c0c8b02 _dispatch_main_queue_callback_4CF + 416
    9   com.apple.CoreFoundation        0x00007fff8133cc59 __CFRUNLOOP_IS_SERVICING_THE_MAIN_DISPATCH_QUEUE__ + 9
    10  com.apple.CoreFoundation        0x00007fff812f92ef __CFRunLoopRun + 2159
    11  com.apple.CoreFoundation        0x00007fff812f8838 CFRunLoopRunSpecific + 296
    12  com.apple.HIToolbox             0x00007fff8b33143f RunCurrentEventLoopInMode + 235
    13  com.apple.HIToolbox             0x00007fff8b3311ba ReceiveNextEventCommon + 431
    14  com.apple.HIToolbox             0x00007fff8b330ffb _BlockUntilNextEventMatchingListInModeWithFilter + 71
    15  com.apple.AppKit                0x00007fff871756d1 _DPSNextEvent + 964
    16  com.apple.AppKit                0x00007fff87174e80 -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] + 194
    17  com.apple.Safari.framework      0x000000010cb9fad0 -[BrowserApplication nextEventMatchingMask:untilDate:inMode:dequeue:] + 246
    18  com.apple.AppKit                0x00007fff87479bd7 -[NSApplication _realDoModalLoop:peek:] + 666
    19  com.apple.AppKit                0x00007fff87478186 -[NSApplication runModalForWindow:] + 119
    20  com.apple.AppKit                0x00007fff87477d53 -[NSAlert runModal] + 144
    21  com.apple.AppKit                0x00007fff8717a65d __55-[NSPersistentUIRestorer promptToIgnorePersistentState]_block_invoke + 1037
    22  com.apple.AppKit                0x00007fff8717a20e -[NSApplication _suppressFinishLaunchingFromEventHandlersWhilePerformingBlock:] + 28
    23  com.apple.AppKit                0x00007fff8717a1ad -[NSPersistentUIRestorer promptToIgnorePersistentState] + 247
    24  com.apple.AppKit                0x00007fff87179e9a -[NSApplication _reopenWindowsAsNecessaryIncludingRestorableState:registeringAsReady:completion Handler:] + 255
    25  com.apple.AppKit                0x00007fff87179c69 -[NSApplication(NSAppleEventHandling) _handleAEOpenEvent:] + 561
    26  com.apple.AppKit                0x00007fff871796b5 -[NSApplication(NSAppleEventHandling) _handleCoreEvent:withReplyEvent:] + 244
    27  com.apple.Foundation            0x00007fff84ac5458 -[NSAppleEventManager dispatchRawAppleEvent:withRawReply:handlerRefCon:] + 290
    28  com.apple.Foundation            0x00007fff84ac52c9 _NSAppleEventManagerGenericHandler + 102
    29  com.apple.AE                    0x00007fff88a5599c aeDispatchAppleEvent(AEDesc const*, AEDesc*, unsigned int, unsigned char*) + 531
    30  com.apple.AE                    0x00007fff88a55719 dispatchEventAndSendReply(AEDesc const*, AEDesc*) + 31
    31  com.apple.AE                    0x00007fff88a55623 aeProcessAppleEvent + 295
    32  com.apple.HIToolbox             0x00007fff8b33e37e AEProcessAppleEvent + 56
    33  com.apple.AppKit                0x00007fff87175d76 _DPSNextEvent + 2665
    34  com.apple.AppKit                0x00007fff87174e80 -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] + 194
    35  com.apple.Safari.framework      0x000000010cb9fad0 -[BrowserApplication nextEventMatchingMask:untilDate:inMode:dequeue:] + 246
    36  com.apple.AppKit                0x00007fff87168e23 -[NSApplication run] + 594
    37  com.apple.AppKit                0x00007fff871542d4 NSApplicationMain + 1832
    38  libdyld.dylib                   0x00007fff8c5465c9 start + 1
    Thread 1:: Dispatch queue: com.apple.libdispatch-manager
    0   libsystem_kernel.dylib          0x00007fff8714a22e kevent64 + 10
    1   libdispatch.dylib               0x00007fff8c0bfa6a _dispatch_mgr_thread + 52
    Thread 2:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 3:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 4:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 5:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 6:: WebCore: IconDatabase
    0   libsystem_kernel.dylib          0x00007fff87149132 __psynch_cvwait + 10
    1   com.apple.WebCore               0x000000010e74b88b WebCore::IconDatabase::syncThreadMainLoop() + 411
    2   com.apple.WebCore               0x000000010e7489d9 WebCore::IconDatabase::iconDatabaseSyncThread() + 361
    3   com.apple.JavaScriptCore        0x000000010d90da9f ***::wtfThreadEntryPoint(void*) + 15
    4   libsystem_pthread.dylib         0x00007fff885492fc _pthread_body + 131
    5   libsystem_pthread.dylib         0x00007fff88549279 _pthread_start + 176
    6   libsystem_pthread.dylib         0x00007fff885474b1 thread_start + 13
    Thread 7:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 8:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 9:: Dispatch queue: com.apple.SafariShared.WBSHistorySQLiteStore
    0   libsqlite3.dylib                0x00007fff8b7371a5 checkTreePage + 2677
    1   libsqlite3.dylib                0x00007fff8b736c84 checkTreePage + 1364
    2   libsqlite3.dylib                0x00007fff8b67f4ac sqlite3VdbeExec + 67324
    3   libsqlite3.dylib                0x00007fff8b66d3df sqlite3_step + 735
    4   com.apple.Safari.framework      0x000000010d127bfc -[WBSSQLiteRowEnumerator nextObject] + 45
    5   com.apple.Safari.framework      0x000000010d0f75bf -[WBSHistorySQLiteStore _checkDatabaseIntegrity] + 71
    6   com.apple.Safari.framework      0x000000010d0f7896 -[WBSHistorySQLiteStore _openDatabase:andCheckIntegrity:] + 458
    7   com.apple.Safari.framework      0x000000010d0f7371 -[WBSHistorySQLiteStore _loadHistory] + 94
    8   libdispatch.dylib               0x00007fff8c0c1323 _dispatch_call_block_and_release + 12
    9   libdispatch.dylib               0x00007fff8c0bcc13 _dispatch_client_callout + 8
    10  libdispatch.dylib               0x00007fff8c0c0365 _dispatch_queue_drain + 1100
    11  libdispatch.dylib               0x00007fff8c0c1ecc _dispatch_queue_invoke + 202
    12  libdispatch.dylib               0x00007fff8c0c0154 _dispatch_queue_drain + 571
    13  libdispatch.dylib               0x00007fff8c0c1ecc _dispatch_queue_invoke + 202
    14  libdispatch.dylib               0x00007fff8c0bf6b7 _dispatch_root_queue_drain + 463
    15  libdispatch.dylib               0x00007fff8c0cdfe4 _dispatch_worker_thread3 + 91
    16  libsystem_pthread.dylib         0x00007fff885496cb _pthread_wqthread + 729
    17  libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 10:: com.apple.CoreAnimation.render-server
    0   libsystem_kernel.dylib          0x00007fff8714452e mach_msg_trap + 10
    1   libsystem_kernel.dylib          0x00007fff8714369f mach_msg + 55
    2   com.apple.QuartzCore            0x00007fff885a9d63 CA::Render::Server::server_thread(void*) + 198
    3   com.apple.QuartzCore            0x00007fff885a9c96 thread_fun + 25
    4   libsystem_pthread.dylib         0x00007fff885492fc _pthread_body + 131
    5   libsystem_pthread.dylib         0x00007fff88549279 _pthread_start + 176
    6   libsystem_pthread.dylib         0x00007fff885474b1 thread_start + 13
    Thread 11:: com.apple.NSURLConnectionLoader
    0   libsystem_kernel.dylib          0x00007fff8714452e mach_msg_trap + 10
    1   libsystem_kernel.dylib          0x00007fff8714369f mach_msg + 55
    2   com.apple.CoreFoundation        0x00007fff812f9b14 __CFRunLoopServiceMachPort + 212
    3   com.apple.CoreFoundation        0x00007fff812f8fdb __CFRunLoopRun + 1371
    4   com.apple.CoreFoundation        0x00007fff812f8838 CFRunLoopRunSpecific + 296
    5   com.apple.CFNetwork             0x00007fff87e4cd20 +[NSURLConnection(Loader) _resourceLoadLoop:] + 434
    6   com.apple.Foundation            0x00007fff84b0bb7a __NSThread__main__ + 1345
    7   libsystem_pthread.dylib         0x00007fff885492fc _pthread_body + 131
    8   libsystem_pthread.dylib         0x00007fff88549279 _pthread_start + 176
    9   libsystem_pthread.dylib         0x00007fff885474b1 thread_start + 13
    Thread 12:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 13:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 14:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 15:
    0   libsystem_kernel.dylib          0x00007fff87149946 __workq_kernreturn + 10
    1   libsystem_pthread.dylib         0x00007fff885474a1 start_wqthread + 13
    Thread 16 Crashed:
    0   libsystem_pthread.dylib         0x00007fff88547695 _pthread_mutex_lock + 87
    1   libsystem_c.dylib               0x00007fff8c58bb78 vfprintf_l + 28
    2   libsystem_c.dylib               0x00007fff8c584620 fprintf + 186
    3   ???                             0x0000000155f955dc 0 + 5737371100
    Thread 16 crashed with X86 Thread State (64-bit):
    rax: 0x0000000000000000  rbx: 0x00007fff725881d8  rcx: 0x00007fff725881f0  rdx: 0x00000000000000a0
    rdi: 0x00007fff725881f0  rsi: 0x00007fff88547b14  rbp: 0x0000000155f91e30  rsp: 0x0000000155f91db0
      r8: 0x000000015565a000   r9: 0x0000000000000054  r10: 0x0000000000000000  r11: 0x0000000000000206
    r12: 0x00007fff725876b8  r13: 0x0000000000000000  r14: 0x0000000000000000  r15: 0x0000000000000000
    rip: 0x00007fff88547695  rfl: 0x0000000000010246  cr2: 0x0000000000000020
    Logical CPU:     0
    Error Code:      0x00000004
    Trap Number:     14
    Binary Images:
          0x10cb22000 -        0x10cb22fff  com.apple.Safari (8.0.2 - 10600.2.5) <2225AE13-780E-3234-9A05-9DD6D94EE96C> /Applications/Safari.app/Contents/MacOS/Safari
          0x10cb29000 -        0x10d462ff7  com.apple.Safari.framework (10600 - 10600.2.5) <70257BE2-5D89-3EAA-8863-269880160EEE> /System/Library/StagedFrameworks/Safari/Safari.framework/Versions/A/Safari
          0x10d903000 -        0x10de16ff3  com.apple.JavaScriptCore (10600 - 10600.2.1) <ABEF8FB3-6DC5-3FCF-9B4A-1DF6411063B0> /System/Library/StagedFrameworks/Safari/JavaScriptCore.framework/Versions/A/Jav aScriptCore
          0x10df7d000 -        0x10e231fff  com.apple.WebKit (10600 - 10600.2.5) <11CA89A1-A002-3FEB-8046-B31E92003AED> /System/Library/StagedFrameworks/Safari/WebKit.framework/Versions/A/WebKit
          0x10e508000 -        0x10e508fff  com.apple.WebKit2 (10600 - 10600.2.5) <ED09F7D3-1F46-3925-8E11-D6AC3492658E> /System/Library/StagedFrameworks/Safari/WebKit2.framework/Versions/A/WebKit2
          0x10e511000 -        0x10e64dffb  com.apple.WebKitLegacy (10600 - 10600.2.5) <0A88D3D6-F5BA-30F4-9D09-87DF653759FC> /System/Library/StagedFrameworks/Safari/WebKitLegacy.framework/Versions/A/WebKi tLegacy
          0x10e744000 -        0x10f6e9ff7  com.apple.WebCore (10600 - 10600.2.1) <628CB849-0E8D-3071-98A3-55E7D24087DF> /System/Library/StagedFrameworks/Safari/WebCore.framework/Versions/A/WebCore
          0x1554f4000 -        0x1554f4ff5 +cl_kernels (???) <D6B0A0F1-805D-43CF-A9D0-875D5DBB7D7E> cl_kernels
          0x1554f6000 -        0x1555dcfef  unorm8_bgra.dylib (2.4.5) <90797750-141F-3114-ACD0-A71363968678> /System/Library/Frameworks/OpenCL.framework/Versions/A/Libraries/ImageFormats/u norm8_bgra.dylib
          0x155620000 -        0x155620fff +cl_kernels (???) <1506A80D-F8A8-4924-8738-986F07BF9D90> cl_kernels
       0x7fff65fef000 -     0x7fff66025837  dyld (353.2.1) <4696A982-1500-34EC-9777-1EF7A03E2659> /usr/lib/dyld
       0x7fff809e3000 -     0x7fff809ebff7  com.apple.AppleSRP (5.0 - 1) <01EC5144-D09A-3D6A-AE35-F6D48585F154> /System/Library/PrivateFrameworks/AppleSRP.framework/Versions/A/AppleSRP
       0x7fff809ec000 -     0x7fff80aafff7  libvMisc.dylib (512) <A4E39464-52EA-34CB-9FFE-53E79B3C65F5> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/libvMisc.dylib
       0x7fff80ab0000 -     0x7fff80b04fff  libc++.1.dylib (120) <1B9530FD-989B-3174-BB1C-BDC159501710> /usr/lib/libc++.1.dylib
       0x7fff80b07000 -     0x7fff80b07fff  com.apple.Accelerate.vecLib (3.10 - vecLib 3.10) <A48738CA-5B6F-3D14-97E9-2BFDFC3DCC06> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/vecLib
       0x7fff80b08000 -     0x7fff80b91fff  com.apple.CoreSymbolication (3.1 - 56072) <8CE81C95-49E8-389F-B989-67CC452C08D0> /System/Library/PrivateFrameworks/CoreSymbolication.framework/Versions/A/CoreSy mbolication
       0x7fff80b92000 -     0x7fff80cb4ff7  com.apple.LaunchServices (644.12 - 644.12) <D7710B20-0561-33BB-A3C8-463691D36E02> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/LaunchS ervices.framework/Versions/A/LaunchServices
       0x7fff80d57000 -     0x7fff80d58fff  libSystem.B.dylib (1213) <DA954461-EC6A-3DF0-8551-6FC810627627> /usr/lib/libSystem.B.dylib
       0x7fff81098000 -     0x7fff8112dff7  com.apple.ColorSync (4.9.0 - 4.9.0) <F06733BD-A10C-3DB3-B050-825351130392> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ColorSync.framework/Versions/A/ColorSync
       0x7fff8113b000 -     0x7fff81167fff  libsandbox.1.dylib (358.1.1) <9A00BD06-579F-3EDF-9D4C-590DFE54B103> /usr/lib/libsandbox.1.dylib
       0x7fff81168000 -     0x7fff81170fe7  libcldcpuengine.dylib (2.4.5) <DF810F9A-1755-3283-82C3-D8192BCD8016> /System/Library/Frameworks/OpenCL.framework/Versions/A/Libraries/libcldcpuengin e.dylib
       0x7fff81171000 -     0x7fff811a4ff7  com.apple.MediaKit (16 - 757) <345EDAFE-3E39-3B0F-8D84-54657EC4396D> /System/Library/PrivateFrameworks/MediaKit.framework/Versions/A/MediaKit
       0x7fff811a5000 -     0x7fff811b0fdb  com.apple.AppleFSCompression (68.1.1 - 1.0) <F30E8CA3-50B3-3B44-90A0-803C5C308BFE> /System/Library/PrivateFrameworks/AppleFSCompression.framework/Versions/A/Apple FSCompression
       0x7fff811eb000 -     0x7fff811ebff7  libunc.dylib (29) <5676F7EA-C1DF-329F-B006-D2C3022B7D70> /usr/lib/system/libunc.dylib
       0x7fff8122e000 -     0x7fff81236fff  libMatch.1.dylib (24) <C917279D-33C2-38A8-9BDD-18F3B24E6FBD> /usr/lib/libMatch.1.dylib
       0x7fff81237000 -     0x7fff81253fff  com.apple.GenerationalStorage (2.0 - 209.11) <9FF8DD11-25FB-3047-A5BF-9415339B3EEC> /System/Library/PrivateFrameworks/GenerationalStorage.framework/Versions/A/Gene rationalStorage
       0x7fff8125e000 -     0x7fff81262fff  libspindump.dylib (182) <7BD8C0AC-1CDA-3864-AE03-470B50160148> /usr/lib/libspindump.dylib
       0x7fff81263000 -     0x7fff81286fff  com.apple.Sharing (328.3 - 328.3) <FDEE49AD-8804-3760-9C14-8D1D10BBEA37> /System/Library/PrivateFrameworks/Sharing.framework/Versions/A/Sharing
       0x7fff81287000 -     0x7fff8161dfff  com.apple.CoreFoundation (6.9 - 1151.16) <F2B088AF-A5C6-3FAE-9EB4-7931AF6359E4> /System/Library/Frameworks/CoreFoundation.framework/Versions/A/CoreFoundation
       0x7fff8161e000 -     0x7fff81629ff7  libcsfde.dylib (471) <797691FA-FC0A-3A95-B6E8-BDB75AEAEDFD> /usr/lib/libcsfde.dylib
       0x7fff8162a000 -     0x7fff81630ff7  libsystem_networkextension.dylib (167.1.10) <29AB225B-D7FB-30ED-9600-65D44B9A9442> /usr/lib/system/libsystem_networkextension.dylib
       0x7fff81631000 -     0x7fff8166eff3  com.apple.bom (14.0 - 193.6) <3CE5593D-DB28-3BFD-943E-6261006FA292> /System/Library/PrivateFrameworks/Bom.framework/Versions/A/Bom
       0x7fff816f8000 -     0x7fff8170dff7  com.apple.AppContainer (4.0 - 238) <9481F305-359A-33E6-93F1-89A25FA14E00> /System/Library/PrivateFrameworks/AppContainer.framework/Versions/A/AppContaine r
       0x7fff8170e000 -     0x7fff8172cff7  com.apple.addressbook.vCard (9.0 - 1499) <B1BC7C0A-A783-3574-8248-BC689F43A0A0> /System/Library/PrivateFrameworks/vCard.framework/Versions/A/vCard
       0x7fff8172d000 -     0x7fff8173fff7  com.apple.CoreDuetDaemonProtocol (1.0 - 1) <CE9FABB4-1C5D-3F9B-9BB8-5CC50C3E5E31> /System/Library/PrivateFrameworks/CoreDuetDaemonProtocol.framework/Versions/A/C oreDuetDaemonProtocol
       0x7fff81740000 -     0x7fff81771fff  libtidy.A.dylib (15.15) <37FC944D-271A-386A-9ADD-FA33AD48F96D> /usr/lib/libtidy.A.dylib
       0x7fff81772000 -     0x7fff817e6fff  com.apple.ApplicationServices.ATS (360 - 375) <62828B40-231D-3F81-8067-1903143DCB6B> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ATS.framework/Versions/A/ATS
       0x7fff817ee000 -     0x7fff81855ff7  com.apple.framework.CoreWiFi (3.0 - 300.4) <19269C1D-EB29-384A-83F3-7DDDEB7D9DAD> /System/Library/PrivateFrameworks/CoreWiFi.framework/Versions/A/CoreWiFi
       0x7fff81856000 -     0x7fff81886ffb  com.apple.GSS (4.0 - 2.0) <D033E7F1-2D34-339F-A814-C67E009DE5A9> /System/Library/Frameworks/GSS.framework/Versions/A/GSS
       0x7fff81887000 -     0x7fff818fbff3  com.apple.securityfoundation (6.0 - 55126) <E7FB7A4E-CB0B-37BA-ADD5-373B2A20A783> /System/Library/Frameworks/SecurityFoundation.framework/Versions/A/SecurityFoun dation
       0x7fff81921000 -     0x7fff81d2eff7  libLAPACK.dylib (1128) <F9201AE7-B031-36DB-BCF8-971E994EF7C1> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/libLAPACK.dylib
       0x7fff81d2f000 -     0x7fff81d54ff7  libPng.dylib (1231) <2D5AC0EE-4056-3F76-97E7-BBD415F072B5> /System/Library/Frameworks/ImageIO.framework/Versions/A/Resources/libPng.dylib
       0x7fff81d55000 -     0x7fff81d58fff  com.apple.xpc.ServiceManagement (1.0 - 1) <7E9E6BB7-AEE7-3F59-BAC0-59EAF105D0C8> /System/Library/Frameworks/ServiceManagement.framework/Versions/A/ServiceManage ment
       0x7fff81d59000 -     0x7fff81fc3ff7  com.apple.imageKit (2.6 - 838) <DDFE019E-DF3E-37DA-AEC0-9182454B7312> /System/Library/Frameworks/Quartz.framework/Versions/A/Frameworks/ImageKit.fram ework/Versions/A/ImageKit
       0x7fff81fc4000 -     0x7fff81fe7ff7  com.apple.framework.familycontrols (4.1 - 410) <41499068-0AB2-38CB-BE6A-F0DD0F06AB52> /System/Library/PrivateFrameworks/FamilyControls.framework/Versions/A/FamilyCon trols
       0x7fff81fe8000 -     0x7fff81fffff7  libLinearAlgebra.dylib (1128) <E78CCBAA-A999-3B65-8EC9-06DB15E67C37> /System/Library/Frameworks/Accelerate.framework/Versions/A/Frameworks/vecLib.fr amework/Versions/A/libLinearAlgebra.dylib
       0x7fff82000000 -     0x7fff82024ff7  com.apple.quartzfilters (1.10.0 - 1.10.0) <1AE50F4A-0098-34E7-B24D-DF7CB94073CE> /System/Library/Frameworks/Quartz.framework/Versions/A/Frameworks/QuartzFilters .framework/Versions/A/QuartzFilters
       0x7fff82025000 -     0x7fff82027fff  com.apple.CoreDuetDebugLogging (1.0 - 1) <9A6E5710-EA99-366E-BF40-9A65EC1B46A1> /System/Library/PrivateFrameworks/CoreDuetDebugLogging.framework/Versions/A/Cor eDuetDebugLogging
       0x7fff820c4000 -     0x7fff8211cff7  com.apple.accounts.AccountsDaemon (113 - 113) <E0074FA1-1872-3F20-8445-3E2FEA290CFB> /System/Library/PrivateFrameworks/AccountsDaemon.framework/Versions/A/AccountsD aemon
       0x7fff82a56000 -     0x7fff82b39fff  libcrypto.0.9.8.dylib (52) <7208EEE2-C090-383E-AADD-7E1BD1321BEC> /usr/lib/libcrypto.0.9.8.dylib
       0x7fff82b3a000 -     0x7fff82b4cfff  libsasl2.2.dylib (193) <E523DD05-544B-3430-8AA9-672408A5AF8B> /usr/lib/libsasl2.2.dylib
       0x7fff82b4d000 -     0x7fff82c7dfff  com.apple.UIFoundation (1.0 - 1) <8E030D93-441C-3997-9CD2-55C8DFAC8B84> /System/Library/PrivateFrameworks/UIFoundation.framework/Versions/A/UIFoundatio n
       0x7fff82ce9000 -     0x7fff82cedff7  libGIF.dylib (1231) <A349BA73-301E-3EDE-8A31-8ACE827C289E> /System/Library/Frameworks/ImageIO.framework/Versions/A/Resources/libGIF.dylib
       0x7fff82cee000 -     0x7fff82d0dfff  com.apple.CoreDuet (1.0 - 1) <36AA9FD5-2685-314D-B364-3FA4688D86BD> /System/Library/PrivateFrameworks/CoreDuet.framework/Versions/A/CoreDuet
       0x7fff82d37000 -     0x7fff83260ff7  com.apple.QuartzComposer (5.1 - 325) <2007FD9E-A5CF-361E-A7DD-ACAF976860AD> /System/Library/Frameworks/Quartz.framework/Versions/A/Frameworks/QuartzCompose r.framework/Versions/A/QuartzComposer
       0x7fff83261000 -     0x7fff83548ffb  com.apple.CoreServices.CarbonCore (1108.1 - 1108.1) <55A16172-ACC0-38B7-8409-3CB92AF33973> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/CarbonC ore.framework/Versions/A/CarbonCore
       0x7fff83549000 -     0x7fff83550ff7  libcompiler_rt.dylib (35) <BF8FC133-EE10-3DA6-9B90-92039E28678F> /usr/lib/system/libcompiler_rt.dylib
       0x7fff83551000 -     0x7fff83589fff  com.apple.RemoteViewServices (2.0 - 99) <C9A62691-B0D9-34B7-B71C-A48B5F4DC553> /System/Library/PrivateFrameworks/RemoteViewServices.framework/Versions/A/Remot eViewServices
       0x7fff8358a000 -     0x7fff8359cff7  com.apple.ImageCapture (9.0 - 9.0) <7FB65DD4-56B5-35C4-862C-7A2DED991D1F> /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/ImageCapture. framework/Versions/A/ImageCapture
       0x7fff8359d000 -     0x7fff835d5ffb  libsystem_network.dylib (411) <C0B2313D-47BE-38A9-BEE6-2634A4F5E14B> /usr/lib/system/libsystem_network.dylib
       0x7fff835d6000 -     0x7fff83e2dff3  com.apple.CoreGraphics (1.600.0 - 772) <6364CBE3-3635-3A53-B448-9D19EF9FEA96> /System/Library/Frameworks/CoreGraphics.framework/Versions/A/CoreGraphics
       0x7fff83e2e000 -     0x7fff83e34ff7  com.apple.XPCService (2.0 - 1) <AA4A5393-1F5D-3465-A417-0414B95DC052> /System/Library/PrivateFrameworks/XPCService.framework/Versions/A/XPCService
       0x7fff83e35000 -     0x7fff83f0bff3  com.apple.DiskImagesFramework (10.10 - 389.1) <7DE2208C-BD55-390A-8167-4F9F11750C4B> /System/Library/PrivateFrameworks/DiskImages.framework/Versions/A/DiskImages
       0x7fff83f15000 -     0x7fff84155ff7  com.apple.AddressBook.framework (9.0 - 1499) <8D5C9530-4D90-32C7-BB5E-3A686FE36BE9> /System/Library/Frameworks/AddressBook.framework/Versions/A/AddressBook
       0x7fff84166000 -     0x7fff8416afff  libCoreVMClient.dylib (79) <FC4E08E3-749E-32FF-B5E9-211F29864831> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libCoreVMClien t.dylib
       0x7fff8448d000 -     0x7fff8452bfff  com.apple.Metadata (10.7.0 - 916.1) <CD389631-0F23-3A29-B43A-E3FFB5BC9438> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/Metadat a.framework/Versions/A/Metadata
       0x7fff8452c000 -     0x7fff8452dfff  libDiagnosticMessagesClient.dylib (100) <2EE8E436-5CDC-34C5-9959-5BA218D507FB> /usr/lib/libDiagnosticMessagesClient.dylib
       0x7fff8453b000 -     0x7fff8453dff7  com.apple.SecCodeWrapper (4.0 - 238) <F450AB10-B0A4-3B55-A1B9-563E55C99333> /System/Library/PrivateFrameworks/SecCodeWrapper.framework/Versions/A/SecCodeWr apper
       0x7fff84673000 -     0x7fff846e2fff  com.apple.SearchKit (1.4.0 - 1.4.0) <BFD6D876-36BA-3A3B-9F15-3E2F7DE6E89D> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/SearchK it.framework/Versions/A/SearchKit
       0x7fff846e3000 -     0x7fff846eaff7  com.apple.phonenumbers (1.1.1 - 105) <AE39B6FE-05AB-3181-BB2A-4D50A8B392F2> /System/Library/PrivateFrameworks/PhoneNumbers.framework/Versions/A/PhoneNumber s
       0x7fff846eb000 -     0x7fff846f3ffb  com.apple.CoreServices.FSEvents (1210 - 1210) <782A9C69-7A45-31A7-8960-D08A36CBD0A7> /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/FSEvent s.framework/Versions/A/FSEvents
       0x7fff846f9000 -     0x7fff8473fffb  libFontRegistry.dylib (134) <01B8034A-45FD-3360-A347-A1896F591363> /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/ ATS.framework/Versions/A/Resources/libFontRegistry.dylib
       0x7fff84740000 -     0x7fff8474dff7  libbz2.1.0.dylib (36) <2DF83FBC-5C08-39E1-94F5-C28653791B5F> /usr/lib/libbz2.1.0.dylib
       0x7fff8474e000 -     0x7fff847d0fff  com.apple.PerformanceAnalysis (1.0 - 1) <2FC0F303-B672-3E64-A978-AB78EAD98395> /System/Library/PrivateFrameworks/PerformanceAnalysis.framework/Versions/A/Perf ormanceAnalysis
       0x7fff847d1000 -     0x7fff847d2ff7  libodfde.dylib (22) <52D0ABCD-F464-362C-86EA-ACA10993F556> /usr/lib/libodfde.dylib
       0x7fff847d3000 -     0x7fff847d4fff  libsystem_secinit.dylib (18) <581DAD0F-6B63-3A48-B63B-917AF799ABAA> /usr/lib/system/libsystem_secinit.dylib
       0x7fff847d5000 -     0x7fff847f0ff7  libCRFSuite.dylib (34) <D64842BE-7BD4-3D0C-9842-1D202F7C2A51> /usr/lib/libCRFSuite.dylib
       0x7fff847f1000 -     0x7fff847f8fff  com.apple.network.statistics.framework (1.2 - 1) <61B311D1-7F15-35B3-80D4-99B8BE90ACD9> /System/Library/PrivateFrameworks/NetworkStatistics.framework/Versions/A/Networ kStatistics
       0x7fff847f9000 -     0x7fff847f9fff  com.apple.CoreServices (62 - 62) <9E4577CA-3FC3-300D-AB00-87ADBDDA2E37> /System/Library/Frameworks/CoreServices.framework/Versions/A/CoreServices
       0x7fff847fa000 -     0x7fff8481fff7  libJPEG.dylib (1231) <35F13BD9-AA92-3510-B5BB-420DA15AE7F2> /System/Library/Frameworks/ImageIO.framework/Versions/A/Resources/libJPEG.dylib
       0x7fff84820000 -     0x7fff84938ffb  com.apple.CoreText (352.0 - 454.1) <AB07DF12-BB1F-3275-A8A3-45F14BF872BF> /System/Library/Frameworks/CoreText.framework/Versions/A/CoreText
       0x7fff84939000 -     0x7fff84994fff  libTIFF.dylib (1231) <ACC9ED11-EED8-3A23-B452-3F40FF7EF435> /System/Library/Frameworks/ImageIO.framework/Versions/A/Resources/libTIFF.dylib
       0x7fff84a2d000 -     0x7fff84a5dfff  libsystem_m.dylib (3086.1) <1E12AB45-6D96-36D0-A226-F24D9FB0D9D6> /usr/lib/system/libsystem_m.dylib
       0x7fff84a5e000 -     0x7fff84a9eff7  libGLImage.dylib (11.0.7) <7CBCEB4B-D22F-3116-8B28-D1C22D28C69D> /System/Library/Frameworks/OpenGL.framework/Versions/A/Libraries/libGLImage.dyl ib
       0x7fff84a9f000 -     0x7fff84aa2fff  com.apple.help (1.3.3 - 46) <CA4541F4-CEF5-355C-8F1F-EA65DC1B400F> /System/Library/Frameworks/Carbon.framework/Versions/A/Frameworks/Help.framewor k/Versions/A/Help
       0x7fff84aa3000 -     0x7fff84dd1ff7  com.apple.Foundation (6.9 - 1151.16) <18EDD673-A010-3E99-956E-DA594CE1FA80> /System/Library/Frameworks/Foundation.framework/Versions/C/Foundation
       0x7fff84dd2000 -     0x7fff84debff7  com.apple.CFOpenDirectory (10.10 - 187) <0ECA5D80-A045-3A2C-A60C-E1605F3AB6BD> /System/Library/Frameworks/OpenDirectory.framework/Versions/A/Frameworks/CFOpen Directory.framework/Versions/A/CFOpenDirectory
       0x7fff85454000 -     0x7fff85471ffb  libresolv.9.dylib (57) <26B38E61-298A-3C3A-82C1-3B5E98AD5E29> /usr/lib/libresolv.9.dylib
       0x7fff854a8000 -     0x7fff854d5fff  com.apple.Accounts (113 - 113) <3145FCC2-D297-3DD1-B74B-9E7DBB0EE33C> /System/Library/Frameworks/Accounts.framework/Versions/A/Accounts
       0x7fff854ff000 -     0x7fff8550afff  libcommonCrypto.dylib (60061) <D381EBC6-69D8-31D3-8084-5A80A32CB748> /usr/lib/system/libcommonCrypto.dylib
       0x7fff8550b000 -     0x7fff8550bfff  com.apple.audio.units.AudioUnit (1.12 - 1.12) <76EF1C9D-DEA4-3E55-A134-4099B2FD2CF2> /System/Library/Frameworks/AudioUnit.framework/Versions/A/AudioUnit
       0x7fff8550c000 -     0x7fff85513fff  com.apple.NetFS (6.0 - 4.0) <1581D25F-CC07-39B0-90E8-5D4F3CF84EBA> /System/Library/Frameworks/NetFS.framework/Versions/A/NetFS
       0x7fff85514000 -     0x7fff85560fff  com.apple.corelocation (1486.17 - 1615.21) <DB68CEB9-0D51-3CB9-86A4-B0400CE6C515> /Syste

    You may have installed the "Genieo" or "InstallMac" ad-injection malware. Follow the instructions on this Apple Support page to remove it.
    Back up all data before making any changes.
    Besides the files listed in the linked support article, you may also need to remove this file in the same way:
    ~/Library/LaunchAgents/com.genieo.completer.ltvbit.plist
    If there are other items with a name that includes "Genieo" or "genieo" alongside any of those you find, remove them as well.
    One of the steps in the article is to remove malicious Safari extensions. Do the equivalent in the Chrome and Firefox browsers, if you use either of those. If Safari crashes on launch, skip that step and come back to it after you've done everything else.
    If you don't find any of the files or extensions listed, or if removing them doesn't stop the ad injection, then you may have one of the other kinds of adware covered by the support article. Follow the rest of the instructions in the article.
    Make sure you don't repeat the mistake that led you to install the malware. Chances are you got it from an Internet cesspit such as "Softonic" or "CNET Download." Never visit either of those sites again. You might also have downloaded it from an ad in a page on some other site. The ad would probably have included a large green button labeled "Download" or "Download Now" in white letters. The button is designed to confuse people who intend to download something else on the same page. If you ever download a file that isn't obviously what you expected, delete it immediately.
    In the Security & Privacy pane of System Preferences, select the General tab. The radio button marked Anywhere  should not be selected. If it is, click the lock icon to unlock the settings, then select one of the other buttons. After that, don't ignore a warning that you are about to run or install an application from an unknown developer.
    Still in System Preferences, open the App Store or Software Update pane and check the box marked
              Install system data files and security updates
    if it's not already checked.

  • I think I have  some Malware/Trojan Horse on MacBook Pro. How to get rid of it?

    My MacBook Pro has worked perfect for the last 2 years, but over the last 2 days when I am on Chrome it has started clicking onto random websites when I click other links, and showing certain words as underlined and as hotlinks. I think I recognise that from having a PC as Malware or Trojan Horse? What is the best way to remove this as I have read through a few threads on here and they advise not downloading any anti virus software as it slows down your Mac instead of helping.
    <Post Edited By Host>

    You installed the "VSearch" trojan, perhaps under a different name. Remove it as follows.
    Malware is constantly changing to get around the defenses against it. The instructions in this comment are valid as of now, as far as I know. They won't necessarily be valid in the future. Anyone finding this comment a few days or more after it was posted should look for more recent discussions or start a new one.
    Back up all data before proceeding.
    Triple-click anywhere in the line below on this page to select it:
    /Library/LaunchAgents/com.vsearch.agent.plist
    Right-click or control-click the line and select
              Services ▹ Reveal in Finder (or just Reveal)
    from the contextual menu.* A folder should open with an item named "com.vsearch.agent.plist" selected. Drag the selected item to the Trash. You may be prompted for your administrator login password.
    Repeat with each of these lines:
    /Library/LaunchDaemons/com.vsearch.daemon.plist
    /Library/LaunchDaemons/com.vsearch.helper.plist
    /Library/LaunchDaemons/Jack.plist
    Restart the computer and empty the Trash. Then delete the following items in the same way:
    /Library/Application Support/VSearch
    /Library/PrivilegedHelperTools/Jack
    /System/Library/Frameworks/VSearch.framework
    ~/Library/Internet Plug-Ins/ConduitNPAPIPlugin.plugin
    Some of these items may be absent, in which case you'll get a message that the file can't be found. Skip that item and go on to the next one.
    From the Safari menu bar, select
              Safari ▹ Preferences... ▹ Extensions
    Uninstall any extensions you don't know you need, including any that have the word "Spigot," "Trovi," or "Conduit" in the description. If in doubt, uninstall all extensions. Do the equivalent for the Firefox and Chrome browsers, if you use either of those.
    Reset the home page and default search engine in all the browsers, if it was changed.
    This trojan is distributed on illegal websites that traffic in pirated content. If you, or anyone else who uses the computer, visit such sites and follow prompts to install software, you can expect much worse to happen in the future.
    You may be wondering why you didn't get a warning from Gatekeeper about installing software from an unknown developer, as you should have. The reason is that this Internet criminal has a codesigning certificate issued by Apple, which causes Gatekeeper to give the installer a pass. Apple could revoke the certificate, but as of this writing, has not done so, even though it's aware of the problem. This failure of oversight has compromised both Gatekeeper and the Developer ID program. You can't rely on Gatekeeper alone to protect you from harmful software.
    *If you don't see the contextual menu item, copy the selected text to the Clipboard by pressing the key combination  command-C. In the Finder, select
              Go ▹ Go to Folder...
    from the menu bar and paste into the box that opens by pressing command-V. You won't see what you pasted because a line break is included. Press return.

Maybe you are looking for

  • Hard drive to TV Problem?

    Alright I have a 1tb hard drive from acomdata and I was having issues with transferring over 4gb. So i reformatted the drive to HFS+ and now i am able to transfer big amounts of data. Heres my question, I was doing this because I was hooking up my ha

  • MDB issue in Weblogic 10.0.2, but working fine in 8.1

    Hello, I have multiple MDB's (EJB 2.1) working fine in Weblogic 8.1 and we are now moving to Weblogic 10.0.2. If I understand EJB2.1 is still supported in Weblogic 10.0.2 so deployed the same EAR files in weblogic 10.0.2 successfully. Then I have con

  • Close blackberry browser session

    Hi, We have a WD Java application for blackberry thats being launched from within the extended notification email. Once the user approves / rejects from within the application we want to provide them with a close or exit link which would close the br

  • Duty cycle value & user prompt

    1. Duty cycle The value input in the front panel works fine up to 34%, but then it fails for any value above 35%. (for input value 35% and above, instrument shows 0.5% instead..for all values..) How can I fix this to make it between 0-100%??? 2. User

  • New Cridex Banking Trojan variant Combines Data Stealer and Email Worm

    Hi Team, In an effort to infect large number of people, cybercriminals have developed a new malicious software program that contains functionality to spread itself quickly. Geodo, a new version of the infamous Cridex (also known as Feodo or Bugat) ba