MORE LOGS ETC DIRT FBI MALWARE EXPOSURE THEY STOLE MY GIRLFRIEND 1/3/36 JORGE BUSTOS LETTER AT HOSPITAL

61 WAS 16 IN MY ARTS CHANNEL JB HYBRIDED MUCH MORE COMING JORGES WIFES NAME HIGHLIGHTED VIA DARK LINE AT TOP

PEDOS EN CARGADO THE BEAUTIFUL FBI


ONLY LOGS PRESENT 10 MINUTES FROM THE TIME SHE DUMPED ME SHE WAS FORCED TO THIS PROVES ALL AT THIS POINT I WAS SLEEPING
555 FOR 15 IE TAX SEASON WAS USED IN MY ART SERIES THESE CHILD MOLESTERS THE ONE WORKING RIGHT NOW RESPONSIBLE CHOSE TO SEXUALLY ENSLAVE HER WHY WONT SHE SELL ME HER PHO NE FEDDY SCARED OF FORENSICS ? DO DRUG TESTS? PEDOS EN CARGADO WESTERN DISTRICT OF ARKANSAS NOW I PAY THE HOSTING FOR 20 YEARS THE DROP BOX AND WRECK FEDERAL LIVES IN THE COURT ROOM AFTER I WILL SELF IMMOLATE MYSELF WITH THE GASALINE THEY SOLD ME AND HAVE KNOWN THEYRE COERCING THIS
Last login: Sun Mar 1 11:13:58 on ttys003
quattro@Quattros-MacBook-Pro ~ % open /Users/quattro/Desktop/MessagesBackup/0d/13/6FF7CA51-F2D5-4B45-B3B4-06F7F9015FDE/6FD7127B-01EA-4E39-A419-F2E4A9C81F57IMG_1217.heic
quattro@Quattros-MacBook-Pro ~ % codesign -dv –verbose=4 /usr/libexec/cameracaptured
Executable=/usr/libexec/cameracaptured
Identifier=com.apple.cameracaptured
Format=Mach-O universal (x86_64 arm64e)
CodeDirectory v=20400 size=753 flags=0x0(none) hashes=13+7 location=embedded
Platform identifier=26
VersionPlatform=1
VersionMin=1704448
VersionSDK=1704448
Hash type=sha256 size=32
CandidateCDHash sha256=0f941477c955ca8f679027324558c9c6a9f4eb20
CandidateCDHashFull sha256=0f941477c955ca8f679027324558c9c6a9f4eb2005830e2f7caf741426c1f4e3
Hash choices=sha256
CMSDigest=0f941477c955ca8f679027324558c9c6a9f4eb2005830e2f7caf741426c1f4e3
CMSDigestType=2
Executable Segment base=0
Executable Segment limit=16384
Executable Segment flags=0x1
Page size=4096
CDHash=0f941477c955ca8f679027324558c9c6a9f4eb20
Signature size=4442
Authority=Software Signing
Authority=Apple Code Signing Certification Authority
Authority=Apple Root CA
Signed Time=Nov 16, 2025 at 9:33:05 PM
Info.plist entries=22
TeamIdentifier=not set
Sealed Resources=none
Internal requirements count=1 size=72
quattro@Quattros-MacBook-Pro ~ % sudo launchctl print system | grep -A5 cameracaptured
Password:
536 – com.apple.cameracaptured
0 – com.apple.postfix.newaliases
0 – com.apple.xpc.roleaccountd
432 – com.apple.eligibilityd
0 0 com.apple.ionodecache
427 – com.apple.nsurlsessiond_privileged
—
0x25d13 M D com.apple.cameracaptured
0x12b03 M A com.apple.CoreServices.coreservicesd
0 M D com.apple.accessories.externalaccessory-server
0x2b80f M A com.apple.audioanalyticsd
0x26c6f M D com.apple.WirelessRadioManager
0x1de03 M A com.apple.mobileassetd.cache-delete
quattro@Quattros-MacBook-Pro ~ % csrutil status
System Integrity Protection status: enabled.
quattro@Quattros-MacBook-Pro ~ %
Last login: Sun Mar 1 12:18:47 on ttys005
quattro@Quattros-MacBook-Pro ~ % log stream –predicate ‘subsystem == “com.apple.TCC”‘ –info
Filtering the log data using “subsystem == “com.apple.TCC””
Timestamp Thread Type Activity PID TTL
2026-03-01 12:26:41.600292-0800 0x863f61 Info 0xfb531 36062 0 replayd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36062.12, function=TCCAccessRequest, service=kTCCServiceScreenCapture,
2026-03-01 12:26:41.600456-0800 0xd90a9d Default 0xfb531 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36062, sender_uid=501, sender_auid=501, function=TCCAccessRequest, msgID=36062.12
2026-03-01 12:26:41.602051-0800 0xd90a9d Info 0xfb531 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36062.12, msg={
service=”kTCCServiceScreenCapture”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:66928, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=2 (0x2)
TCCD_MSG_ID=”36062.12″
}
2026-03-01 12:26:41.602270-0800 0xd90a9d Info 0xfb531 36145 0 tccd: [com.apple.TCC:access] AttributionChain: responsible={TCCDProcess: identifier=com.apple.Terminal, pid=1795, auid=501, euid=501, responsible_path=/System/Applications/Utilities/Terminal.app/Contents/MacOS/Terminal, binary_path=/System/Applications/Utilities/Terminal.app/Contents/MacOS/Terminal}, accessing={TCCDProcess: identifier=com.apple.appkit.xpc.ThemeWidgetControlViewService, pid=66928, auid=501, euid=501, binary_path=/System/Library/Frameworks/AppKit.framework/Versions/C/XPCServices/ThemeWidgetControlViewService.xpc/Contents/MacOS/ThemeWidgetControlViewService}, requesting={TCCDProcess: identifier=com.apple.replayd, pid=36062, auid=501, euid=501, binary_path=/usr/libexec/replayd},
2026-03-01 12:26:41.602295-0800 0xd90a9d Info 0xfb531 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.replayd, pid=36062> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:26:41.602364-0800 0x863f61 Info 0xfb531 36062 0 replayd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0x941090000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0x8eb3d4a832ea43d7>: 0
“auth_value” => <uint64: 0x8eb3d4a832ea43c7>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0x8eb3d4a832ea43df>: 1
“auth_reason” => <uint64: 0x8eb3d4a832ea438f>: 11
}
2026-03-01 12:26:41.602307-0800 0xd90a9d Info 0xfb531 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.appkit.xpc.ThemeWidgetControlViewService, pid=66928> has the com.apple.private.tcc.allow entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:26:41.602440-0800 0x863f61 Info 0xfb532 36062 0 replayd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36062.13, function=TCCAccessRequest, service=kTCCServiceScreenCapture,
2026-03-01 12:26:41.602318-0800 0xd90a9d Info 0xfb531 36145 0 tccd: [com.apple.TCC:access] Auth:Allowed (Entitled) to kTCCServiceScreenCapture for TCCDProcess: identifier=com.apple.appkit.xpc.ThemeWidgetControlViewService, pid=66928, auid=501, euid=501, binary_path=/System/Library/Frameworks/AppKit.framework/Versions/C/XPCServices/ThemeWidgetControlViewService.xpc/Contents/MacOS/ThemeWidgetControlViewService; checked by TCCDProcess: identifier=com.apple.replayd, pid=36062, auid=501, euid=501, binary_path=/usr/libexec/replayd because: IsTCCManager
2026-03-01 12:26:41.602338-0800 0xd90a9d Info 0xfb531 36145 0 tccd: [com.apple.TCC:access] system tccd handled entitlements check for: kTCCServiceScreenCapture
2026-03-01 12:26:41.602525-0800 0xdd0b1a Default 0xfb532 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36062, sender_uid=501, sender_auid=501, function=TCCAccessRequest, msgID=36062.13
2026-03-01 12:26:41.602552-0800 0xdd0b1a Info 0xfb532 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36062.13, msg={
service=”kTCCServiceScreenCapture”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:66928, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=0 (0x0)
TCCD_MSG_ID=”36062.13″
}
2026-03-01 12:26:41.602688-0800 0xdd0b1a Info 0xfb532 36145 0 tccd: [com.apple.TCC:access] AttributionChain: responsible={TCCDProcess: identifier=com.apple.Terminal, pid=1795, auid=501, euid=501, responsible_path=/System/Applications/Utilities/Terminal.app/Contents/MacOS/Terminal, binary_path=/System/Applications/Utilities/Terminal.app/Contents/MacOS/Terminal}, accessing={TCCDProcess: identifier=com.apple.appkit.xpc.ThemeWidgetControlViewService, pid=66928, auid=501, euid=501, binary_path=/System/Library/Frameworks/AppKit.framework/Versions/C/XPCServices/ThemeWidgetControlViewService.xpc/Contents/MacOS/ThemeWidgetControlViewService}, requesting={TCCDProcess: identifier=com.apple.replayd, pid=36062, auid=501, euid=501, binary_path=/usr/libexec/replayd},
2026-03-01 12:26:41.602701-0800 0xdd0b1a Info 0xfb532 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.replayd, pid=36062> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:26:41.602731-0800 0xdd0b1a Info 0xfb532 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.appkit.xpc.ThemeWidgetControlViewService, pid=66928> has the com.apple.private.tcc.allow entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:26:41.602770-0800 0xdd0b1a Info 0xfb532 36145 0 tccd: [com.apple.TCC:access] Auth:Allowed (Entitled) to kTCCServiceScreenCapture for TCCDProcess: identifier=com.apple.appkit.xpc.ThemeWidgetControlViewService, pid=66928, auid=501, euid=501, binary_path=/System/Library/Frameworks/AppKit.framework/Versions/C/XPCServices/ThemeWidgetControlViewService.xpc/Contents/MacOS/ThemeWidgetControlViewService; checked by TCCDProcess: identifier=com.apple.replayd, pid=36062, auid=501, euid=501, binary_path=/usr/libexec/replayd because: IsTCCManager
2026-03-01 12:26:41.602788-0800 0xdd0b1a Info 0xfb532 36145 0 tccd: [com.apple.TCC:access] system tccd handled entitlements check for: kTCCServiceScreenCapture
2026-03-01 12:26:41.602811-0800 0x863f61 Info 0xfb532 36062 0 replayd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0x941090000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0x8eb3d4a832ea43d7>: 0
“auth_value” => <uint64: 0x8eb3d4a832ea43c7>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0x8eb3d4a832ea43df>: 1
“auth_reason” => <uint64: 0x8eb3d4a832ea438f>: 11
}
2026-03-01 12:27:01.246153-0800 0xde0e34 Info 0x1005e0 90833 0 screencapture: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=90833.1, function=TCCAccessRequest, service=kTCCServiceListenEvent,
2026-03-01 12:27:01.246626-0800 0xd90a9d Default 0x1005e0 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=90833, sender_uid=501, sender_auid=501, function=TCCAccessRequest, msgID=90833.1
2026-03-01 12:27:01.246689-0800 0xd90a9d Info 0x1005e0 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=90833.1, msg={
require_purpose=<xpc_null>
service=”kTCCServiceListenEvent”
function=”TCCAccessRequest”
preflight=true
target_token={NULL}
TCCD_MSG_ID=”90833.1″
background_session=false
}
2026-03-01 12:27:01.247137-0800 0xd90a9d Info 0x1005e0 36145 0 tccd: [com.apple.TCC:access] AttributionChain: responsible={TCCDProcess: identifier=com.apple.systemuiserver, pid=726, auid=501, euid=501, responsible_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer, binary_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer}, requesting={TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture},
2026-03-01 12:27:01.247169-0800 0xd90a9d Info 0x1005e0 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.screencapture, pid=90833> has the com.apple.private.tcc.allow entitlement for service kTCCServiceListenEvent (composed to parent: (null))
2026-03-01 12:27:01.247190-0800 0xd90a9d Info 0x1005e0 36145 0 tccd: [com.apple.TCC:access] Auth:Allowed (Entitled) to kTCCServiceListenEvent for TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture; checked by TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture because: IsRequestor
2026-03-01 12:27:01.247204-0800 0xd90a9d Info 0x1005e0 36145 0 tccd: [com.apple.TCC:access] system tccd handled entitlements check for: kTCCServiceListenEvent
2026-03-01 12:27:01.247244-0800 0xde0e34 Info 0x1005e0 90833 0 screencapture: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0x1011729b0> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0x942a54215823c1df>: 0
“auth_value” => <uint64: 0x942a54215823c1cf>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0x942a54215823c1d7>: 1
“auth_reason” => <uint64: 0x942a54215823c187>: 11
}
2026-03-01 12:27:01.247617-0800 0x10a6 Info 0xfed3b 407 0 WindowServer: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=407.282, function=TCCAccessRequest, service=kTCCServiceListenEvent, target_token={pid:90833, auid:501, euid:501},
2026-03-01 12:27:01.247733-0800 0xde0e64 Default 0xfed3b 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=407, sender_uid=88, sender_auid=-1, function=TCCAccessRequest, msgID=407.282
2026-03-01 12:27:01.247767-0800 0xde0e64 Info 0xfed3b 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=407.282, msg={
require_purpose=<xpc_null>
service=”kTCCServiceListenEvent”
function=”TCCAccessRequest”
preflight=true
target_token={pid:90833, auid:501, euid:501}
TCCD_MSG_ID=”407.282″
background_session=false
}
2026-03-01 12:27:01.248020-0800 0xde0e64 Info 0xfed3b 36145 0 tccd: [com.apple.TCC:access] AttributionChain: responsible={TCCDProcess: identifier=com.apple.systemuiserver, pid=726, auid=501, euid=501, responsible_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer, binary_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer}, accessing={TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture}, requesting={TCCDProcess: identifier=com.apple.WindowServer, pid=407, auid=88, euid=88, binary_path=/System/Library/PrivateFrameworks/SkyLight.framework/Versions/A/Resources/WindowServer},
2026-03-01 12:27:01.248041-0800 0xde0e64 Info 0xfed3b 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.WindowServer, pid=407> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceListenEvent (composed to parent: (null))
2026-03-01 12:27:01.248051-0800 0xde0e64 Info 0xfed3b 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.screencapture, pid=90833> has the com.apple.private.tcc.allow entitlement for service kTCCServiceListenEvent (composed to parent: (null))
2026-03-01 12:27:01.248067-0800 0xde0e64 Info 0xfed3b 36145 0 tccd: [com.apple.TCC:access] Auth:Allowed (Entitled) to kTCCServiceListenEvent for TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture; checked by TCCDProcess: identifier=com.apple.WindowServer, pid=407, auid=88, euid=88, binary_path=/System/Library/PrivateFrameworks/SkyLight.framework/Versions/A/Resources/WindowServer because: IsTCCManager
2026-03-01 12:27:01.248077-0800 0xde0e64 Info 0xfed3b 36145 0 tccd: [com.apple.TCC:access] system tccd handled entitlements check for: kTCCServiceListenEvent
2026-03-01 12:27:01.248104-0800 0x10a6 Info 0xfed3b 407 0 WindowServer: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0x8d53fe000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xba6a02f7bf3cc977>: 0
“auth_value” => <uint64: 0xba6a02f7bf3cc967>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0xba6a02f7bf3cc97f>: 1
“auth_reason” => <uint64: 0xba6a02f7bf3cc92f>: 11
}
2026-03-01 12:27:01.268724-0800 0x863f61 Info 0xfb533 36062 0 replayd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36062.14, function=TCCAccessRequest, service=kTCCServiceScreenCapture,
2026-03-01 12:27:01.268777-0800 0xd90a9d Default 0xfb533 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36062, sender_uid=501, sender_auid=501, function=TCCAccessRequest, msgID=36062.14
2026-03-01 12:27:01.268817-0800 0xd90a9d Info 0xfb533 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36062.14, msg={
service=”kTCCServiceScreenCapture”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:90833, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=2 (0x2)
TCCD_MSG_ID=”36062.14″
}
2026-03-01 12:27:01.268980-0800 0xd90a9d Info 0xfb533 36145 0 tccd: [com.apple.TCC:access] AttributionChain: responsible={TCCDProcess: identifier=com.apple.systemuiserver, pid=726, auid=501, euid=501, responsible_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer, binary_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer}, accessing={TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture}, requesting={TCCDProcess: identifier=com.apple.replayd, pid=36062, auid=501, euid=501, binary_path=/usr/libexec/replayd},
2026-03-01 12:27:01.268998-0800 0xd90a9d Info 0xfb533 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.replayd, pid=36062> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:27:01.269006-0800 0xd90a9d Info 0xfb533 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.systemuiserver, pid=726> has the com.apple.private.tcc.allow entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:27:01.269033-0800 0x863f61 Info 0xfb533 36062 0 replayd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0x941090000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0x8eb3d4a832ea43d7>: 0
“auth_value” => <uint64: 0x8eb3d4a832ea43c7>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0x8eb3d4a832ea43df>: 1
“auth_reason” => <uint64: 0x8eb3d4a832ea438f>: 11
}
2026-03-01 12:27:01.269014-0800 0xd90a9d Info 0xfb533 36145 0 tccd: [com.apple.TCC:access] Auth:Allowed (Entitled) to kTCCServiceScreenCapture because accessing process TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture has the check-allow-on-responsible-process entitlement and responsible process TCCDProcess: identifier=com.apple.systemuiserver, pid=726, auid=501, euid=501, responsible_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer, binary_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer has corresponding allow entitlement
2026-03-01 12:27:01.269019-0800 0xd90a9d Info 0xfb533 36145 0 tccd: [com.apple.TCC:access] system tccd handled entitlements check for: kTCCServiceScreenCapture
2026-03-01 12:27:01.269099-0800 0x863f61 Info 0xfb534 36062 0 replayd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36062.15, function=TCCAccessRequest, service=kTCCServiceScreenCapture,
2026-03-01 12:27:01.269141-0800 0xd90a9d Default 0xfb534 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36062, sender_uid=501, sender_auid=501, function=TCCAccessRequest, msgID=36062.15
2026-03-01 12:27:01.269167-0800 0xd90a9d Info 0xfb534 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36062.15, msg={
service=”kTCCServiceScreenCapture”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:90833, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=0 (0x0)
TCCD_MSG_ID=”36062.15″
}
2026-03-01 12:27:01.269303-0800 0xd90a9d Info 0xfb534 36145 0 tccd: [com.apple.TCC:access] AttributionChain: responsible={TCCDProcess: identifier=com.apple.systemuiserver, pid=726, auid=501, euid=501, responsible_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer, binary_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer}, accessing={TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture}, requesting={TCCDProcess: identifier=com.apple.replayd, pid=36062, auid=501, euid=501, binary_path=/usr/libexec/replayd},
2026-03-01 12:27:01.269315-0800 0xd90a9d Info 0xfb534 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.replayd, pid=36062> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:27:01.269322-0800 0xd90a9d Info 0xfb534 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.systemuiserver, pid=726> has the com.apple.private.tcc.allow entitlement for service kTCCServiceScreenCapture (composed to parent: (null))
2026-03-01 12:27:01.269352-0800 0x863f61 Info 0xfb534 36062 0 replayd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0x941090000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0x8eb3d4a832ea43d7>: 0
“auth_value” => <uint64: 0x8eb3d4a832ea43c7>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0x8eb3d4a832ea43df>: 1
“auth_reason” => <uint64: 0x8eb3d4a832ea438f>: 11
}
2026-03-01 12:27:01.269330-0800 0xd90a9d Info 0xfb534 36145 0 tccd: [com.apple.TCC:access] Auth:Allowed (Entitled) to kTCCServiceScreenCapture because accessing process TCCDProcess: identifier=com.apple.screencapture, pid=90833, auid=501, euid=501, binary_path=/usr/sbin/screencapture has the check-allow-on-responsible-process entitlement and responsible process TCCDProcess: identifier=com.apple.systemuiserver, pid=726, auid=501, euid=501, responsible_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer, binary_path=/System/Library/CoreServices/SystemUIServer.app/Contents/MacOS/SystemUIServer has corresponding allow entitlement
2026-03-01 12:27:01.269334-0800 0xd90a9d Info 0xfb534 36145 0 tccd: [com.apple.TCC:access] system tccd handled entitlements check for: kTCCServiceScreenCapture
2026-03-01 12:27:02.509788-0800 0xde100f Info 0xfe679 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36214.114, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles,
2026-03-01 12:27:02.510300-0800 0xd90a9d Default 0xfe679 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.114
2026-03-01 12:27:02.510385-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.114, msg={
service=”kTCCServiceSystemPolicyAllFiles”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1018, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=2 (0x2)
TCCD_MSG_ID=”36214.114″
}
2026-03-01 12:27:02.510694-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:27:02.510728-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.sandboxd, pid=36214> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceAll (composed to parent: (null))
2026-03-01 12:27:02.510905-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:27:02.510932-0800 0xd90a9d Default 0xfe679 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.114, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles, preflight=yes, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:27:02.510951-0800 0xd90a9d Default 0xfe679 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.114, attribution={accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:27:02.511959-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Dropbox.app/Contents/MacOS/Dropbox[36214]: from cache: = com.getdropbox.dropbox, type 0 (97/162)
2026-03-01 12:27:02.512001-0800 0xd90a9d Default 0xfe679 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.114, subject=com.getdropbox.dropbox,
2026-03-01 12:27:02.512790-0800 0xd90a9d Default 0xfe679 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.getdropbox.dropbox, type: 0: 0x7f4d30300 at /Applications/Dropbox.app
2026-03-01 12:27:02.530091-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.getdropbox.dropbox : identifier “com.getdropbox.dropbox” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = G7HH3F8CAK; status: 0
2026-03-01 12:27:02.530287-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.getdropbox.dropbox : anchor apple; status: -67050
2026-03-01 12:27:02.530321-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] For com.getdropbox.dropbox: matches platform requirements: No
2026-03-01 12:27:02.530339-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:27:02.530393-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyAllFiles, from Sub:{com.getdropbox.dropbox}Resp:{TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, ReqResult(Auth Right: Denied (Service Policy), promptType: 1,DB Action:None)
2026-03-01 12:27:02.530420-0800 0xd90a9d Default 0xfe679 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.114, authValue=0, authReason=5, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:27:02.530594-0800 0xd90a9d Info 0xfe679 36145 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=0 (0x0)
result=false
auth_version=1 (0x1)
auth_reason=5 (0x5)
}
2026-03-01 12:27:02.530609-0800 0xd90a9d Default 0xfe679 36145 0 tccd: [com.apple.TCC:access] REPLY: (0) function=TCCAccessRequest, msgID=36214.114
2026-03-01 12:27:02.530658-0800 0xde100f Info 0xfe679 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33065f>: 0
“result” => <bool: 0x1feea7850>: false
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab330677>: 5
}
2026-03-01 12:27:02.530695-0800 0xde100f Info 0xfe679 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is not this process
2026-03-01 12:27:02.530704-0800 0xde100f Info 0xfe679 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is present: 0
2026-03-01 12:27:02.530709-0800 0xde100f Info 0xfe679 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Numbers of entries in cache: 5, max: 5
2026-03-01 12:27:02.530732-0800 0xde100f Info 0xfe679 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] REMOVE: (<private>, <private>)
2026-03-01 12:27:02.530779-0800 0xde100f Info 0xfe679 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] SET: (<private>, <private>) -> <private>
2026-03-01 12:27:02.530959-0800 0xde100f Info 0xfe67a 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd: request: msgID=36214.115, function=TCCAccessRequest, service=kTCCServiceSystemPolicyDocumentsFolder,
2026-03-01 12:27:02.531507-0800 0xd90a9c Default 0xfe67a 36307 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=501, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.115
2026-03-01 12:27:02.531691-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.115, msg={
service=”kTCCServiceSystemPolicyDocumentsFolder”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1018, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=0 (0x0)
TCCD_MSG_ID=”36214.115″
}
2026-03-01 12:27:02.532083-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:27:02.532125-0800 0xd90a9c Default 0xfe67a 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.115, function=TCCAccessRequest, service=kTCCServiceSystemPolicyDocumentsFolder, preflight=no, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:27:02.532147-0800 0xd90a9c Default 0xfe67a 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.115, attribution={accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:27:02.533423-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Dropbox.app/Contents/MacOS/Dropbox[36214]: from cache: = com.getdropbox.dropbox, type 0 (55/77)
2026-03-01 12:27:02.533464-0800 0xd90a9c Default 0xfe67a 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.115, subject=com.getdropbox.dropbox,
2026-03-01 12:27:02.534687-0800 0xd90a9c Default 0xfe67a 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.getdropbox.dropbox, type: 0: 0xa42ccc600 at /Applications/Dropbox.app
2026-03-01 12:27:02.544428-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0xa42ccc600) from com.getdropbox.dropbox : identifier “com.getdropbox.dropbox” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = G7HH3F8CAK; status: 0
2026-03-01 12:27:02.544502-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0xa42ccc600) from com.getdropbox.dropbox : anchor apple; status: -67050
2026-03-01 12:27:02.544511-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] For com.getdropbox.dropbox: matches platform requirements: No
2026-03-01 12:27:02.544522-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:27:02.544581-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyDocumentsFolder, from Sub:{com.getdropbox.dropbox}Resp:{TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, ReqResult(Auth Right: Allowed (User Consent), promptType: 1,DB Action:None)
2026-03-01 12:27:02.544619-0800 0xd90a9c Default 0xfe67a 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.115, authValue=2, authReason=2, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:27:02.544827-0800 0xd90a9c Info 0xfe67a 36307 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=2 (0x2)
result=true
auth_version=1 (0x1)
auth_reason=2 (0x2)
}
2026-03-01 12:27:02.544844-0800 0xd90a9c Default 0xfe67a 36307 0 tccd: [com.apple.TCC:access] REPLY: (501) function=TCCAccessRequest, msgID=36214.115
2026-03-01 12:27:02.544895-0800 0xde100f Info 0xfe67a 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33064f>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab33064f>: 2
}
2026-03-01 12:27:05.083046-0800 0xde100f Info 0xfe67c 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36214.116, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles,
2026-03-01 12:27:05.083160-0800 0xd90a9d Default 0xfe67c 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.116
2026-03-01 12:27:05.083244-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.116, msg={
service=”kTCCServiceSystemPolicyAllFiles”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1259, auid:-1, euid:0}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=2 (0x2)
TCCD_MSG_ID=”36214.116″
}
2026-03-01 12:27:05.083600-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:27:05.083645-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.sandboxd, pid=36214> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceAll (composed to parent: (null))
2026-03-01 12:27:05.083840-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:27:05.083875-0800 0xd90a9d Default 0xfe67c 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.116, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles, preflight=yes, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:27:05.083896-0800 0xd90a9d Default 0xfe67c 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.116, attribution={accessing={TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:27:05.084954-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity[36214]: from cache: = com.avast.AAFM, type 0 (98/163)
2026-03-01 12:27:05.084979-0800 0xd90a9d Default 0xfe67c 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.116, subject=com.avast.AAFM,
2026-03-01 12:27:05.085680-0800 0xd90a9d Default 0xfe67c 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.avast.AAFM, type: 0: 0x7f4d30300 at /Applications/Avast.app
2026-03-01 12:27:05.102981-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.avast.AAFM : identifier “com.avast.AAFM” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = “6H4HRTU5E3”; status: 0
2026-03-01 12:27:05.103294-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.avast.AAFM : anchor apple; status: -67050
2026-03-01 12:27:05.103308-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] For com.avast.AAFM: matches platform requirements: No
2026-03-01 12:27:05.103326-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:27:05.103357-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyAllFiles, from Sub:{com.avast.AAFM}Resp:{TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, ReqResult(Auth Right: Allowed (System Set), promptType: 1,DB Action:None)
2026-03-01 12:27:05.103375-0800 0xd90a9d Default 0xfe67c 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.116, authValue=2, authReason=4, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:27:05.103460-0800 0xd90a9d Info 0xfe67c 36145 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=2 (0x2)
result=true
auth_version=1 (0x1)
auth_reason=4 (0x4)
}
2026-03-01 12:27:05.103471-0800 0xd90a9d Default 0xfe67c 36145 0 tccd: [com.apple.TCC:access] REPLY: (0) function=TCCAccessRequest, msgID=36214.116
2026-03-01 12:27:05.103519-0800 0xde100f Info 0xfe67c 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33064f>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab33067f>: 4
}
2026-03-01 12:27:05.103551-0800 0xde100f Info 0xfe67c 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is not this process
2026-03-01 12:27:05.103561-0800 0xde100f Info 0xfe67c 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is present: 0
2026-03-01 12:27:05.103566-0800 0xde100f Info 0xfe67c 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Numbers of entries in cache: 5, max: 5
2026-03-01 12:27:05.103592-0800 0xde100f Info 0xfe67c 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] REMOVE: (<private>, <private>)
2026-03-01 12:27:05.103621-0800 0xde100f Info 0xfe67c 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] SET: (<private>, <private>) -> <private>
2026-03-01 12:28:44.853768-0800 0xe153f3 Info 0x1016f1 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36214.117, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles,
2026-03-01 12:28:44.853900-0800 0xd90a9d Default 0x1016f1 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.117
2026-03-01 12:28:44.853989-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.117, msg={
service=”kTCCServiceSystemPolicyAllFiles”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1018, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=2 (0x2)
TCCD_MSG_ID=”36214.117″
}
2026-03-01 12:28:44.854302-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:28:44.854339-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.sandboxd, pid=36214> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceAll (composed to parent: (null))
2026-03-01 12:28:44.854543-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:28:44.854587-0800 0xd90a9d Default 0x1016f1 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.117, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles, preflight=yes, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:28:44.854622-0800 0xd90a9d Default 0x1016f1 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.117, attribution={accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:28:44.856049-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Dropbox.app/Contents/MacOS/Dropbox[36214]: from cache: = com.getdropbox.dropbox, type 0 (99/164)
2026-03-01 12:28:44.856088-0800 0xd90a9d Default 0x1016f1 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.117, subject=com.getdropbox.dropbox,
2026-03-01 12:28:44.857226-0800 0xd90a9d Default 0x1016f1 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.getdropbox.dropbox, type: 0: 0x7f4d30300 at /Applications/Dropbox.app
2026-03-01 12:28:44.873538-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.getdropbox.dropbox : identifier “com.getdropbox.dropbox” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = G7HH3F8CAK; status: 0
2026-03-01 12:28:44.873677-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.getdropbox.dropbox : anchor apple; status: -67050
2026-03-01 12:28:44.873702-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] For com.getdropbox.dropbox: matches platform requirements: No
2026-03-01 12:28:44.873720-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:28:44.873752-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyAllFiles, from Sub:{com.getdropbox.dropbox}Resp:{TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, ReqResult(Auth Right: Denied (Service Policy), promptType: 1,DB Action:None)
2026-03-01 12:28:44.873774-0800 0xd90a9d Default 0x1016f1 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.117, authValue=0, authReason=5, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:28:44.873948-0800 0xd90a9d Info 0x1016f1 36145 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=0 (0x0)
result=false
auth_version=1 (0x1)
auth_reason=5 (0x5)
}
2026-03-01 12:28:44.873965-0800 0xd90a9d Default 0x1016f1 36145 0 tccd: [com.apple.TCC:access] REPLY: (0) function=TCCAccessRequest, msgID=36214.117
2026-03-01 12:28:44.874039-0800 0xe153f3 Info 0x1016f1 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33065f>: 0
“result” => <bool: 0x1feea7850>: false
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab330677>: 5
}
2026-03-01 12:28:44.874075-0800 0xe153f3 Info 0x1016f1 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is not this process
2026-03-01 12:28:44.874091-0800 0xe153f3 Info 0x1016f1 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is present: 0
2026-03-01 12:28:44.874099-0800 0xe153f3 Info 0x1016f1 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Numbers of entries in cache: 5, max: 5
2026-03-01 12:28:44.874116-0800 0xe153f3 Info 0x1016f1 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] REMOVE: (<private>, <private>)
2026-03-01 12:28:44.874143-0800 0xe153f3 Info 0x1016f1 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] SET: (<private>, <private>) -> <private>
2026-03-01 12:28:44.874321-0800 0xe153f3 Info 0x1016f2 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd: request: msgID=36214.118, function=TCCAccessRequest, service=kTCCServiceSystemPolicyDocumentsFolder,
2026-03-01 12:28:44.874417-0800 0xde1f16 Default 0x1016f2 36307 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=501, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.118
2026-03-01 12:28:44.874502-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.118, msg={
service=”kTCCServiceSystemPolicyDocumentsFolder”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1018, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=0 (0x0)
TCCD_MSG_ID=”36214.118″
}
2026-03-01 12:28:44.874845-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:28:44.874884-0800 0xde1f16 Default 0x1016f2 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.118, function=TCCAccessRequest, service=kTCCServiceSystemPolicyDocumentsFolder, preflight=no, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:28:44.874906-0800 0xde1f16 Default 0x1016f2 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.118, attribution={accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:28:44.876063-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Dropbox.app/Contents/MacOS/Dropbox[36214]: from cache: = com.getdropbox.dropbox, type 0 (56/78)
2026-03-01 12:28:44.876094-0800 0xde1f16 Default 0x1016f2 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.118, subject=com.getdropbox.dropbox,
2026-03-01 12:28:44.877097-0800 0xde1f16 Default 0x1016f2 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.getdropbox.dropbox, type: 0: 0xa42ccc600 at /Applications/Dropbox.app
2026-03-01 12:28:44.887245-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0xa42ccc600) from com.getdropbox.dropbox : identifier “com.getdropbox.dropbox” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = G7HH3F8CAK; status: 0
2026-03-01 12:28:44.887329-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0xa42ccc600) from com.getdropbox.dropbox : anchor apple; status: -67050
2026-03-01 12:28:44.887343-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] For com.getdropbox.dropbox: matches platform requirements: No
2026-03-01 12:28:44.887354-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:28:44.887373-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyDocumentsFolder, from Sub:{com.getdropbox.dropbox}Resp:{TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, ReqResult(Auth Right: Allowed (User Consent), promptType: 1,DB Action:None)
2026-03-01 12:28:44.887388-0800 0xde1f16 Default 0x1016f2 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.118, authValue=2, authReason=2, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:28:44.887487-0800 0xde1f16 Info 0x1016f2 36307 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=2 (0x2)
result=true
auth_version=1 (0x1)
auth_reason=2 (0x2)
}
2026-03-01 12:28:44.887494-0800 0xde1f16 Default 0x1016f2 36307 0 tccd: [com.apple.TCC:access] REPLY: (501) function=TCCAccessRequest, msgID=36214.118
2026-03-01 12:28:44.887551-0800 0xe153f3 Info 0x1016f2 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33064f>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab33064f>: 2
}
2026-03-01 12:28:50.767811-0800 0xe3a470 Info 0x1016f4 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36214.119, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles,
2026-03-01 12:28:50.767919-0800 0xe3532f Default 0x1016f4 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.119
2026-03-01 12:28:50.768000-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.119, msg={
service=”kTCCServiceSystemPolicyAllFiles”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1259, auid:-1, euid:0}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=0 (0x0)
TCCD_MSG_ID=”36214.119″
}
2026-03-01 12:28:50.768292-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:28:50.768321-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.sandboxd, pid=36214> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceAll (composed to parent: (null))
2026-03-01 12:28:50.768491-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:28:50.768517-0800 0xe3532f Default 0x1016f4 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.119, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles, preflight=no, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:28:50.768535-0800 0xe3532f Default 0x1016f4 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.119, attribution={accessing={TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:28:50.769425-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity[36214]: from cache: = com.avast.AAFM, type 0 (100/165)
2026-03-01 12:28:50.769444-0800 0xe3532f Default 0x1016f4 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.119, subject=com.avast.AAFM,
2026-03-01 12:28:50.770117-0800 0xe3532f Default 0x1016f4 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.avast.AAFM, type: 0: 0x7f4d30300 at /Applications/Avast.app
2026-03-01 12:28:50.787448-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.avast.AAFM : identifier “com.avast.AAFM” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = “6H4HRTU5E3”; status: 0
2026-03-01 12:28:50.787805-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.avast.AAFM : anchor apple; status: -67050
2026-03-01 12:28:50.787822-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] For com.avast.AAFM: matches platform requirements: No
2026-03-01 12:28:50.787842-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:28:50.787878-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyAllFiles, from Sub:{com.avast.AAFM}Resp:{TCCDProcess: identifier=com.avast.Antivirus.EndpointSecurity, pid=1259, auid=0, euid=0, binary_path=/Applications/Avast.app/Contents/Backend/utils/com.avast.Antivirus.EndpointSecurity.app/Contents/MacOS/com.avast.Antivirus.EndpointSecurity}, ReqResult(Auth Right: Allowed (System Set), promptType: 1,DB Action:None)
2026-03-01 12:28:50.787899-0800 0xe3532f Default 0x1016f4 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.119, authValue=2, authReason=4, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:28:50.787992-0800 0xe3532f Info 0x1016f4 36145 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=2 (0x2)
result=true
auth_version=1 (0x1)
auth_reason=4 (0x4)
}
2026-03-01 12:28:50.788005-0800 0xe3532f Default 0x1016f4 36145 0 tccd: [com.apple.TCC:access] REPLY: (0) function=TCCAccessRequest, msgID=36214.119
2026-03-01 12:28:50.788054-0800 0xe3a470 Info 0x1016f4 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33064f>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab33067f>: 4
}
2026-03-01 12:28:50.788087-0800 0xe3a470 Info 0x1016f4 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is not this process
2026-03-01 12:28:50.788100-0800 0xe3a470 Info 0x1016f4 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is present: 0
2026-03-01 12:28:50.788109-0800 0xe3a470 Info 0x1016f4 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Numbers of entries in cache: 5, max: 5
2026-03-01 12:28:50.788127-0800 0xe3a470 Info 0x1016f4 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] REMOVE: (<private>, <private>)
2026-03-01 12:28:50.788153-0800 0xe3a470 Info 0x1016f4 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] SET: (<private>, <private>) -> <private>
2026-03-01 12:29:06.931988-0800 0xe46a16 Info 0x1016f7 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd.system: request: msgID=36214.120, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles,
2026-03-01 12:29:06.932095-0800 0xe3a471 Default 0x1016f7 36145 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.120
2026-03-01 12:29:06.932179-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.120, msg={
service=”kTCCServiceSystemPolicyAllFiles”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1018, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=2 (0x2)
TCCD_MSG_ID=”36214.120″
}
2026-03-01 12:29:06.932477-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:29:06.932510-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] <TCCDProcess: identifier=com.apple.sandboxd, pid=36214> has the com.apple.private.tcc.manager.check-by-audit-token entitlement for service kTCCServiceAll (composed to parent: (null))
2026-03-01 12:29:06.932688-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:29:06.932715-0800 0xe3a471 Default 0x1016f7 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.120, function=TCCAccessRequest, service=kTCCServiceSystemPolicyAllFiles, preflight=yes, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:29:06.932734-0800 0xe3a471 Default 0x1016f7 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.120, attribution={accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:29:06.933672-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Dropbox.app/Contents/MacOS/Dropbox[36214]: from cache: = com.getdropbox.dropbox, type 0 (101/166)
2026-03-01 12:29:06.933694-0800 0xe3a471 Default 0x1016f7 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.120, subject=com.getdropbox.dropbox,
2026-03-01 12:29:06.934458-0800 0xe3a471 Default 0x1016f7 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.getdropbox.dropbox, type: 0: 0x7f4d30300 at /Applications/Dropbox.app
2026-03-01 12:29:06.950146-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.getdropbox.dropbox : identifier “com.getdropbox.dropbox” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = G7HH3F8CAK; status: 0
2026-03-01 12:29:06.950324-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0x7f4d30300) from com.getdropbox.dropbox : anchor apple; status: -67050
2026-03-01 12:29:06.950344-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] For com.getdropbox.dropbox: matches platform requirements: No
2026-03-01 12:29:06.950368-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:29:06.950405-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyAllFiles, from Sub:{com.getdropbox.dropbox}Resp:{TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, ReqResult(Auth Right: Denied (Service Policy), promptType: 1,DB Action:None)
2026-03-01 12:29:06.950432-0800 0xe3a471 Default 0x1016f7 36145 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.120, authValue=0, authReason=5, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:29:06.950630-0800 0xe3a471 Info 0x1016f7 36145 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=0 (0x0)
result=false
auth_version=1 (0x1)
auth_reason=5 (0x5)
}
2026-03-01 12:29:06.950645-0800 0xe3a471 Default 0x1016f7 36145 0 tccd: [com.apple.TCC:access] REPLY: (0) function=TCCAccessRequest, msgID=36214.120
2026-03-01 12:29:06.950714-0800 0xe46a16 Info 0x1016f7 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33065f>: 0
“result” => <bool: 0x1feea7850>: false
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab330677>: 5
}
2026-03-01 12:29:06.950749-0800 0xe46a16 Info 0x1016f7 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is not this process
2026-03-01 12:29:06.950762-0800 0xe46a16 Info 0x1016f7 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Credential is present: 0
2026-03-01 12:29:06.950770-0800 0xe46a16 Info 0x1016f7 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] Numbers of entries in cache: 5, max: 5
2026-03-01 12:29:06.950789-0800 0xe46a16 Info 0x1016f7 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] REMOVE: (<private>, <private>)
2026-03-01 12:29:06.950817-0800 0xe46a16 Info 0x1016f7 36214 0 sandboxd: (TCC) [com.apple.TCC:cache] SET: (<private>, <private>) -> <private>
2026-03-01 12:29:06.950980-0800 0xe46a16 Info 0x1016f8 36214 0 sandboxd: (TCC) [com.apple.TCC:access] SEND: 0/7 synchronous to com.apple.tccd: request: msgID=36214.121, function=TCCAccessRequest, service=kTCCServiceSystemPolicyDocumentsFolder,
2026-03-01 12:29:06.951091-0800 0xe3536b Default 0x1016f8 36307 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=501, sender_pid=36214, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=36214.121
2026-03-01 12:29:06.951171-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] REQUEST_MSG: msgID=36214.121, msg={
service=”kTCCServiceSystemPolicyDocumentsFolder”
TCCD_MSG_SPI_VERSION=2 (0x2)
function=”TCCAccessRequest”
TCCD_MSG_MESSAGE_OPTION_REQUEST_RECORD_UPGRADE_POLICY_POLICY_KEY=1 (0x1)
TCCD_MSG_REQUEST_TYPE_KEY=0 (0x0)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_RIGHTS_MASK_KEY=5 (0x5)
TCC_MSG_REQUEST_AUTHORIZATION_SUBJECT_CREDENTIAL_DICTIONARY_KEY={
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_TYPE_KEY=1 (0x1)
TCCD_MSG_CREDENTIAL_AUTHENTICATOR_AUDIT_TOKEN_KEY={pid:1018, auid:501, euid:501}
}
TCCD_MSG_MESSAGE_OPTION_REQUEST_USAGE_STRING_POLICY_KEY=2 (0x2)
TCCD_MSG_MESSAGE_OPTION_REQUEST_PROMPT_POLICY_KEY=0 (0x0)
TCCD_MSG_ID=”36214.121″
}
2026-03-01 12:29:06.951545-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] AttributionChain: accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd},
2026-03-01 12:29:06.951586-0800 0xe3536b Default 0x1016f8 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=36214.121, function=TCCAccessRequest, service=kTCCServiceSystemPolicyDocumentsFolder, preflight=no, query=1, client_dict=(null), daemon_dict=<private>
2026-03-01 12:29:06.951608-0800 0xe3536b Default 0x1016f8 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=36214.121, attribution={accessing={TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, requesting={TCCDProcess: identifier=com.apple.sandboxd, pid=36214, auid=0, euid=0, binary_path=/usr/libexec/sandboxd}, },
2026-03-01 12:29:06.952914-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] IDENTITY_ATTRIBUTION: /Applications/Dropbox.app/Contents/MacOS/Dropbox[36214]: from cache: = com.getdropbox.dropbox, type 0 (57/79)
2026-03-01 12:29:06.952948-0800 0xe3536b Default 0x1016f8 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=36214.121, subject=com.getdropbox.dropbox,
2026-03-01 12:29:06.954035-0800 0xe3536b Default 0x1016f8 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.getdropbox.dropbox, type: 0: 0xa42ccc600 at /Applications/Dropbox.app
2026-03-01 12:29:06.964309-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0xa42ccc600) from com.getdropbox.dropbox : identifier “com.getdropbox.dropbox” and anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = G7HH3F8CAK; status: 0
2026-03-01 12:29:06.964378-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity matchesCodeRequirement:]: SecStaticCodeCheckValidity() static code (0xa42ccc600) from com.getdropbox.dropbox : anchor apple; status: -67050
2026-03-01 12:29:06.964388-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] For com.getdropbox.dropbox: matches platform requirements: No
2026-03-01 12:29:06.964398-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] -[TCCDPlatformMacOS promptingPolicyForIdentity:accessingService:withAttributionChain:]: promptPolicy = 0; isApplePlatformBinary = 0
2026-03-01 12:29:06.964415-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] Handling access request to kTCCServiceSystemPolicyDocumentsFolder, from Sub:{com.getdropbox.dropbox}Resp:{TCCDProcess: identifier=com.getdropbox.dropbox, pid=1018, auid=501, euid=501, binary_path=/Applications/Dropbox.app/Contents/MacOS/Dropbox}, ReqResult(Auth Right: Allowed (User Consent), promptType: 1,DB Action:None)
2026-03-01 12:29:06.964430-0800 0xe3536b Default 0x1016f8 36307 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=36214.121, authValue=2, authReason=2, authVersion=1, desired_auth=0, error=(null),
2026-03-01 12:29:06.964520-0800 0xe3536b Info 0x1016f8 36307 0 tccd: [com.apple.TCC:access] REPLY_MSG: msg={
prompt_type=1 (0x1)
auth_value=2 (0x2)
result=true
auth_version=1 (0x1)
auth_reason=2 (0x2)
}
2026-03-01 12:29:06.964529-0800 0xe3536b Default 0x1016f8 36307 0 tccd: [com.apple.TCC:access] REPLY: (501) function=TCCAccessRequest, msgID=36214.121
2026-03-01 12:29:06.964570-0800 0xe46a16 Info 0x1016f8 36214 0 sandboxd: (TCC) [com.apple.TCC:access] RECV: synchronous reply <dictionary: 0xbe1028000> { count = 5, transaction: 0, voucher = 0x0, contents =
“prompt_type” => <uint64: 0xbc79044dab330657>: 1
“auth_value” => <uint64: 0xbc79044dab33064f>: 2
“result” => <bool: 0x1feea7830>: true
“auth_version” => <uint64: 0xbc79044dab330657>: 1
“auth_reason” => <uint64: 0xbc79044dab33064f>: 2
}
Last login: Sun Mar 1 10:47:09 on ttys001
quattro@Quattros-MacBook-Pro ~ % last | head
quattro ttys001 Sun Mar 1 10:55 still logged in
quattro ttys001 Sun Mar 1 10:47 – 10:47 (00:00)
quattro ttys001 Sun Mar 1 10:45 – 10:45 (00:00)
quattro ttys001 Sun Mar 1 10:45 – 10:45 (00:00)
quattro ttys001 Sun Mar 1 05:05 – 05:09 (00:03)
quattro ttys001 Sun Mar 1 04:19 – 04:19 (00:00)
quattro ttys001 Sun Mar 1 04:18 – 04:18 (00:00)
quattro ttys001 Sun Mar 1 04:18 – 04:18 (00:00)
quattro ttys001 Sun Mar 1 04:18 – 04:18 (00:00)
quattro ttys001 Sun Mar 1 04:16 – 04:16 (00:00)
quattro@Quattros-MacBook-Pro ~ % systemsetup -getremotelogin
You need administrator access to run this tool… exiting!
quattro@Quattros-MacBook-Pro ~ % sudo systemsetup -getremotelogin
Password:
Remote Login: Off
quattro@Quattros-MacBook-Pro ~ % last
quattro ttys004 Sun Mar 1 11:53 still logged in
quattro ttys003 Sun Mar 1 11:13 still logged in
quattro ttys002 Sun Mar 1 11:09 still logged in
quattro ttys002 Sun Mar 1 10:56 – 10:56 (00:00)
quattro ttys001 Sun Mar 1 10:55 still logged in
quattro ttys001 Sun Mar 1 10:47 – 10:47 (00:00)
quattro ttys001 Sun Mar 1 10:45 – 10:45 (00:00)
quattro ttys001 Sun Mar 1 10:45 – 10:45 (00:00)
quattro ttys001 Sun Mar 1 05:05 – 05:09 (00:03)
quattro ttys001 Sun Mar 1 04:19 – 04:19 (00:00)
quattro ttys001 Sun Mar 1 04:18 – 04:18 (00:00)
quattro ttys001 Sun Mar 1 04:18 – 04:18 (00:00)
quattro ttys001 Sun Mar 1 04:18 – 04:18 (00:00)
quattro ttys001 Sun Mar 1 04:16 – 04:16 (00:00)
quattro ttys001 Sun Mar 1 04:15 – 04:15 (00:00)
quattro ttys001 Sun Mar 1 04:11 – 04:11 (00:00)
quattro ttys000 Sun Mar 1 03:39 still logged in
quattro console Sun Mar 1 03:32 still logged in
reboot time Sun Mar 1 03:29
shutdown time Sun Mar 1 03:28
quattro ttys000 Sat Feb 28 03:13 – 03:13 (00:00)
quattro ttys000 Sat Feb 28 01:58 – 01:58 (00:00)
quattro ttys000 Fri Feb 27 21:58 – 21:58 (00:00)
quattro ttys001 Fri Feb 27 12:01 – 12:01 (00:00)
quattro ttys000 Fri Feb 27 12:01 – 12:01 (00:00)
quattro console Fri Feb 27 12:01 – 03:28 (1+15:27)
reboot time Fri Feb 27 12:00
quattro ttys001 Fri Feb 27 11:58 – crash (00:01)
quattro ttys000 Fri Feb 27 11:58 – crash (00:01)
quattro console Fri Feb 27 11:58 – crash (00:01)
reboot time Fri Feb 27 11:57
quattro ttys001 Fri Feb 27 08:24 – 08:24 (00:00)
quattro ttys000 Fri Feb 27 07:14 – 07:14 (00:00)
quattro ttys001 Fri Feb 27 07:13 – 07:13 (00:00)
quattro ttys001 Fri Feb 27 07:13 – 07:13 (00:00)
quattro ttys000 Fri Feb 27 07:08 – 07:08 (00:00)
quattro ttys001 Fri Feb 27 06:31 – 06:31 (00:00)
quattro ttys001 Fri Feb 27 06:29 – 06:29 (00:00)
quattro ttys001 Fri Feb 27 06:28 – 06:28 (00:00)
quattro ttys000 Thu Feb 26 17:53 – 17:53 (00:00)
quattro ttys000 Thu Feb 26 17:49 – 17:49 (00:00)
quattro console Thu Feb 26 15:39 – crash (20:17)
ASHLEY console Thu Feb 26 14:33 – 15:39 (01:05)
quattro ttys000 Thu Feb 26 12:45 – 12:45 (00:00)
quattro ttys001 Thu Feb 26 00:02 – 00:02 (00:00)
quattro ttys001 Wed Feb 25 23:52 – 23:52 (00:00)
quattro ttys001 Wed Feb 25 23:32 – 23:35 (00:03)
quattro ttys001 Wed Feb 25 23:32 – 23:32 (00:00)
quattro ttys001 Wed Feb 25 23:17 – 23:17 (00:00)
quattro ttys001 Wed Feb 25 23:04 – 23:04 (00:00)
quattro ttys000 Wed Feb 25 20:19 – 20:19 (00:00)
quattro console Wed Feb 25 03:36 – 14:33 (1+10:57)
reboot time Wed Feb 25 03:35
shutdown time Wed Feb 25 03:34
quattro ttys000 Tue Feb 24 18:16 – 18:16 (00:00)
quattro console Tue Feb 24 18:16 – 03:34 (09:18)
reboot time Tue Feb 24 18:16
shutdown time Tue Feb 24 18:14
quattro ttys000 Tue Feb 24 18:11 – 18:11 (00:00)
quattro ttys000 Tue Feb 24 15:20 – 15:20 (00:00)
quattro console Tue Feb 24 15:19 – 18:11 (02:51)
ASHLEY console Tue Feb 24 14:58 – 15:19 (00:21)
quattro ttys001 Tue Feb 24 06:20 – 06:20 (00:00)
quattro ttys000 Tue Feb 24 06:18 – 15:20 (09:01)
quattro ttys001 Tue Feb 24 06:07 – 06:07 (00:00)
quattro ttys000 Tue Feb 24 06:07 – 06:07 (00:00)
quattro ttys001 Tue Feb 24 06:01 – 06:01 (00:00)
quattro ttys000 Tue Feb 24 06:01 – 06:01 (00:00)
quattro ttys001 Tue Feb 24 05:53 – 05:54 (00:00)
quattro ttys000 Tue Feb 24 05:44 – 05:44 (00:00)
quattro ttys001 Tue Feb 24 05:19 – 05:22 (00:02)
quattro ttys000 Tue Feb 24 05:13 – 05:13 (00:00)
quattro console Tue Feb 24 05:13 – 14:58 (09:45)
reboot time Tue Feb 24 04:42
quattro ttys001 Tue Feb 24 03:05 – 03:05 (00:00)
quattro ttys001 Tue Feb 24 03:04 – 03:04 (00:00)
quattro ttys000 Tue Feb 24 02:57 – crash (01:45)
quattro ttys000 Tue Feb 24 00:07 – 00:07 (00:00)
quattro ttys000 Mon Feb 23 23:38 – 23:38 (00:00)
quattro console Mon Feb 23 23:38 – crash (05:04)
reboot time Mon Feb 23 23:38
shutdown time Mon Feb 23 17:29
quattro console Mon Feb 23 17:13 – 17:29 (00:16)
reboot time Mon Feb 23 17:12
quattro ttys000 Sun Feb 22 21:49 – 21:49 (00:00)
quattro ttys000 Sun Feb 22 20:46 – 20:46 (00:00)
quattro console Sun Feb 22 20:46 – crash (20:26)
quattro ttys000 Sun Feb 22 17:45 – 17:45 (00:00)
quattro console Sun Feb 22 17:45 – 18:12 (00:27)
ASHLEY console Sun Feb 22 13:17 – 17:45 (04:27)
quattro ttys000 Fri Feb 20 20:04 – 20:04 (00:00)
quattro console Fri Feb 20 20:04 – 13:17 (1+17:13)
reboot time Fri Feb 20 20:04
shutdown time Fri Feb 20 19:53
quattro ttys001 Fri Feb 20 19:51 – 19:51 (00:00)
quattro ttys001 Fri Feb 20 19:50 – 19:50 (00:00)
quattro ttys001 Fri Feb 20 19:49 – 19:49 (00:00)
quattro ttys001 Fri Feb 20 19:48 – 19:49 (00:00)
quattro ttys000 Fri Feb 20 19:47 – 19:47 (00:00)
quattro ttys000 Fri Feb 20 18:23 – 18:23 (00:00)
quattro ttys003 Fri Feb 20 17:58 – 17:58 (00:00)
quattro ttys002 Fri Feb 20 17:57 – 17:57 (00:00)
quattro ttys001 Fri Feb 20 17:56 – 18:00 (00:03)
quattro ttys000 Fri Feb 20 17:56 – 17:56 (00:00)
quattro console Fri Feb 20 17:20 – 19:53 (02:32)
reboot time Fri Feb 20 17:09
shutdown time Fri Feb 20 16:03
quattro console Fri Feb 20 15:16 – 16:03 (00:47)
quattro console Thu Feb 19 23:05 – 14:46 (15:41)
reboot time Thu Feb 19 23:04
quattro ttys000 Thu Feb 19 22:14 – 22:14 (00:00)
quattro console Thu Feb 19 22:14 – crash (00:50)
ASHLEY console Thu Feb 19 14:26 – 22:13 (07:47)
quattro ttys000 Thu Feb 19 10:51 – 10:51 (00:00)
quattro ttys000 Thu Feb 19 05:21 – 05:21 (00:00)
quattro ttys001 Wed Feb 18 21:54 – 21:54 (00:00)
quattro ttys000 Tue Feb 17 22:58 – 22:58 (00:00)
quattro ttys000 Tue Feb 17 20:52 – 20:52 (00:00)
quattro ttys000 Tue Feb 17 20:40 – 20:40 (00:00)
quattro console Tue Feb 17 17:02 – 14:26 (1+21:24)
reboot time Tue Feb 17 17:01
ASHLEY console Tue Feb 17 17:00 – crash (00:01)
quattro ttys000 Tue Feb 17 10:09 – 10:09 (00:00)
quattro ttys001 Mon Feb 16 17:50 – 17:52 (00:01)
quattro ttys000 Mon Feb 16 17:50 – 17:50 (00:00)
quattro ttys001 Mon Feb 16 17:49 – 17:50 (00:00)
quattro ttys000 Mon Feb 16 17:49 – 17:49 (00:00)
quattro ttys001 Mon Feb 16 17:47 – 17:47 (00:00)
quattro ttys000 Mon Feb 16 17:46 – 17:46 (00:00)
quattro console Mon Feb 16 17:33 – 16:59 (23:25)
reboot time Mon Feb 16 17:33
shutdown time Mon Feb 16 17:28
quattro ttys001 Sun Feb 15 19:43 – 19:55 (00:12)
quattro ttys001 Sun Feb 15 19:43 – 19:43 (00:00)
quattro ttys000 Sun Feb 15 19:38 – 19:38 (00:00)
quattro ttys001 Sun Feb 15 19:26 – 19:31 (00:04)
quattro ttys001 Sun Feb 15 19:26 – 19:26 (00:00)
quattro ttys001 Sun Feb 15 19:25 – 19:25 (00:00)
quattro ttys001 Sun Feb 15 19:15 – 19:19 (00:04)
quattro ttys000 Sun Feb 15 19:08 – 19:08 (00:00)
quattro ttys000 Sun Feb 15 07:02 – 07:02 (00:00)
quattro ttys000 Sun Feb 15 05:00 – 05:00 (00:00)
quattro ttys000 Sun Feb 15 04:58 – 04:58 (00:00)
quattro ttys000 Sun Feb 15 04:32 – 04:32 (00:00)
quattro ttys000 Sun Feb 15 04:27 – 04:27 (00:00)
quattro ttys000 Sun Feb 15 04:18 – 04:18 (00:00)
quattro ttys001 Sun Feb 15 03:24 – 03:24 (00:00)
quattro ttys000 Sun Feb 15 03:20 – 03:20 (00:00)
quattro ttys000 Fri Feb 13 14:24 – 14:24 (00:00)
quattro ttys000 Tue Feb 10 16:47 – 16:47 (00:00)
quattro ttys000 Mon Feb 9 23:17 – 23:17 (00:00)
quattro console Mon Feb 9 23:17 – 17:28 (6+18:11)
reboot time Mon Feb 9 23:16
shutdown time Mon Feb 9 23:12
quattro ttys000 Mon Feb 9 15:44 – 15:44 (00:00)
quattro ttys000 Sun Feb 8 16:17 – 16:17 (00:00)
quattro console Sun Feb 8 07:28 – 23:12 (1+15:43)
reboot time Sun Feb 8 07:28
quattro ttys000 Sun Feb 8 07:20 – 07:20 (00:00)
quattro ttys001 Sun Feb 8 05:51 – 05:51 (00:00)
quattro ttys001 Sun Feb 8 05:50 – 05:51 (00:00)
quattro ttys001 Sun Feb 8 05:50 – 05:50 (00:00)
quattro ttys001 Sun Feb 8 05:50 – 05:50 (00:00)
quattro ttys001 Sun Feb 8 05:50 – 05:50 (00:00)
quattro ttys001 Sun Feb 8 05:49 – 05:49 (00:00)
quattro ttys000 Sun Feb 8 05:47 – 05:47 (00:00)
quattro ttys000 Sat Feb 7 19:45 – 19:45 (00:00)
quattro ttys000 Sat Feb 7 06:03 – 06:03 (00:00)
quattro ttys000 Sat Feb 7 06:00 – 06:00 (00:00)
quattro console Fri Feb 6 15:52 – 07:27 (1+15:34)
reboot time Fri Feb 6 15:49
quattro ttys000 Fri Feb 6 15:40 – 15:40 (00:00)
quattro ttys000 Fri Feb 6 15:38 – 15:38 (00:00)
quattro console Fri Feb 6 09:09 – crash (06:40)
reboot time Fri Feb 6 09:06
shutdown time Fri Feb 6 09:04
quattro ttys000 Fri Feb 6 06:23 – 06:23 (00:00)
quattro console Fri Feb 6 06:04 – 09:04 (03:00)
reboot time Fri Feb 6 06:03
shutdown time Fri Feb 6 06:00
quattro ttys000 Thu Feb 5 21:29 – 21:29 (00:00)
quattro ttys000 Thu Feb 5 21:29 – 21:29 (00:00)
quattro console Thu Feb 5 20:28 – 06:00 (09:32)
reboot time Thu Feb 5 20:27
shutdown time Thu Feb 5 20:19
quattro ttys002 Thu Feb 5 19:27 – 19:27 (00:00)
quattro ttys001 Thu Feb 5 19:27 – 19:27 (00:00)
quattro ttys000 Thu Feb 5 19:27 – 19:27 (00:00)
quattro console Thu Feb 5 19:27 – 20:19 (00:52)
reboot time Thu Feb 5 19:24
shutdown time Thu Feb 5 19:24
quattro ttys000 Thu Feb 5 18:50 – 18:50 (00:00)
quattro ttys000 Thu Feb 5 18:48 – 18:48 (00:00)
quattro ttys003 Thu Feb 5 18:47 – 18:47 (00:00)
quattro ttys002 Thu Feb 5 18:33 – 18:33 (00:00)
quattro ttys001 Thu Feb 5 18:22 – 18:22 (00:00)
quattro ttys001 Thu Feb 5 18:19 – 18:19 (00:00)
quattro ttys001 Thu Feb 5 18:17 – 18:17 (00:00)
quattro ttys000 Thu Feb 5 18:14 – 18:14 (00:00)
quattro ttys000 Thu Feb 5 18:14 – 18:14 (00:00)
quattro ttys000 Thu Feb 5 17:22 – 17:22 (00:00)
quattro ttys002 Thu Feb 5 17:06 – 17:14 (00:08)
quattro ttys001 Thu Feb 5 17:05 – 17:05 (00:00)
quattro ttys000 Thu Feb 5 16:50 – 16:50 (00:00)
quattro ttys001 Thu Feb 5 16:49 – 16:49 (00:00)
quattro ttys000 Thu Feb 5 16:46 – 16:46 (00:00)
quattro console Thu Feb 5 04:08 – 19:24 (15:16)
reboot time Thu Feb 5 04:07
quattro ttys000 Wed Feb 4 18:27 – 18:27 (00:00)
quattro ttys001 Wed Feb 4 18:01 – 18:26 (00:25)
quattro ttys001 Wed Feb 4 18:00 – 18:00 (00:00)
quattro ttys000 Wed Feb 4 17:59 – 17:59 (00:00)
root ttys002 Wed Feb 4 17:58 – 17:58 (00:00)
quattro ttys000 Wed Feb 4 17:58 – 17:59 (00:01)
quattro ttys000 Wed Feb 4 17:57 – 17:57 (00:00)
quattro ttys001 Wed Feb 4 17:54 – 17:54 (00:00)
quattro ttys000 Wed Feb 4 17:54 – 17:54 (00:00)
quattro ttys005 Wed Feb 4 17:44 – 17:44 (00:00)
quattro ttys006 Wed Feb 4 17:24 – 17:24 (00:00)
quattro ttys006 Wed Feb 4 17:17 – 17:17 (00:00)
quattro ttys006 Wed Feb 4 17:17 – 17:17 (00:00)
quattro ttys006 Wed Feb 4 17:17 – 17:17 (00:00)
quattro ttys005 Wed Feb 4 17:16 – 17:16 (00:00)
quattro ttys005 Wed Feb 4 10:08 – 10:08 (00:00)
quattro ttys004 Wed Feb 4 10:08 – 10:08 (00:00)
quattro ttys003 Wed Feb 4 10:08 – 10:08 (00:00)
quattro ttys002 Wed Feb 4 10:08 – 10:08 (00:00)
quattro ttys001 Wed Feb 4 10:08 – 10:08 (00:00)
quattro ttys000 Wed Feb 4 10:08 – 10:08 (00:00)
quattro console Wed Feb 4 10:08 – crash (17:59)
reboot time Wed Feb 4 10:08
quattro ttys005 Wed Feb 4 08:15 – crash (01:52)
quattro ttys004 Wed Feb 4 07:50 – crash (02:17)
quattro ttys003 Wed Feb 4 07:29 – crash (02:39)
quattro ttys002 Wed Feb 4 07:13 – crash (02:55)
quattro ttys001 Wed Feb 4 04:40 – crash (05:27)
quattro ttys000 Wed Feb 4 04:40 – crash (05:27)
quattro ttys001 Wed Feb 4 04:39 – 04:39 (00:00)
quattro ttys000 Wed Feb 4 04:37 – 04:37 (00:00)
quattro ttys000 Wed Feb 4 02:43 – 02:43 (00:00)
quattro console Wed Feb 4 02:40 – crash (07:28)
reboot time Wed Feb 4 02:39
quattro ttys000 Wed Feb 4 02:36 – 02:36 (00:00)
quattro ttys001 Wed Feb 4 02:35 – 02:35 (00:00)
quattro ttys000 Wed Feb 4 02:33 – 02:33 (00:00)
quattro ttys000 Wed Feb 4 02:21 – 02:21 (00:00)
quattro ttys000 Wed Feb 4 02:21 – 02:21 (00:00)
quattro ttys000 Wed Feb 4 02:20 – 02:20 (00:00)
quattro ttys001 Wed Feb 4 02:16 – 02:16 (00:00)
quattro ttys000 Wed Feb 4 02:16 – 02:16 (00:00)
quattro ttys000 Wed Feb 4 01:57 – 01:57 (00:00)
quattro console Wed Feb 4 01:57 – 02:39 (00:42)
reboot time Wed Feb 4 01:56
shutdown time Wed Feb 4 01:56
quattro ttys002 Tue Feb 3 21:24 – 21:24 (00:00)
quattro ttys001 Tue Feb 3 21:21 – 21:21 (00:00)
quattro ttys000 Tue Feb 3 21:19 – 21:19 (00:00)
quattro console Tue Feb 3 21:16 – 01:56 (04:40)
reboot time Tue Feb 3 21:15
quattro console Tue Feb 3 20:51 – crash (00:23)
reboot time Tue Feb 3 20:51
quattro console Tue Feb 3 05:12 – crash (15:38)
reboot time Tue Feb 3 05:12
quattro ttys000 Mon Feb 2 03:22 – 03:22 (00:00)
quattro console Thu Jan 29 17:25 – crash (4+11:47)
reboot time Thu Jan 29 17:24
shutdown time Thu Jan 29 16:51
quattro console Thu Jan 29 09:01 – 16:51 (07:50)
reboot time Thu Jan 29 08:31
shutdown time Thu Jan 29 07:57
quattro console Wed Jan 28 04:03 – 07:57 (1+03:53)
reboot time Wed Jan 28 04:02
wtmp begins Wed Jan 28 04:02:33 PST 2026
quattro@Quattros-MacBook-Pro ~ %