NANDTaskScheduler
executablemacOS923.3 KBx86_64, arm64
System service — manages exception handling and inter-process hardware communication
Provides exception handling and Mach IPC services with direct hardware/driver communication capabilities. Accesses additional Mach services to handle system-level exceptions and coordinate with other kernel and user-space components. Communicates with 7 network endpoints and references 14 bundle identifiers, suggesting integration with multiple system services. Runs as a signed Apple system executable with hardware-level access permissions.AI
Fingerprint
- Platform
- macOS
- Type
- executable
- Arch
- x86_64, arm64
- Min OS
- 26.1.0
- SDK
- 26.1.0
- File Size
- 923.3 KB
- UUID
- 11507771-0D49-3FE7-8E9E-6322481C3770
- Analyzed
- 2026-04-09T09:39:37Z
- CDHash
- 4851599792d08e04430768c7a8033bd8a7e933429d0a1c456f4a4cd4a2c470b0
Capabilities
HardwareDirect hardware/driver communication
/System/Library/Frameworks/IOKit.framework/Versions/A/IOKitIpcException: access additional Mach services
com.apple.security.exception.mach-lookup.global-nameEntitlements4
Interesting Strings
Bundle IDs(14)
File Paths(3)
Network Surface
Networking Frameworks
DNA Capability Vector
Location
0
Keychain
0
Network
0
Storage
0
Hardware
1
IPC
1
Analytics
0
Security
0
System
0
Behavioral Profile
URL Endpoints
5
Telemetry Strings
0
File Paths
3
Bundle IDs
14
IOKit Constants
0
Library Functions
0
Structural HashesSHA-256
Static Libraries0 / 55 functions identified
Functions(55)
0x1000008d0sub_1000008d0
0x10000a3ecsub_10000a3ec
0x10000a424sub_10000a424
0x10000a468sub_10000a468
0x10000a4a8sub_10000a4a8
0x10000a660sub_10000a660
0x10000a6fcsub_10000a6fc
0x10000a85csub_10000a85c
0x10000a97csub_10000a97c
0x10000aa54sub_10000aa54
0x10000ab1csub_10000ab1c
0x10000ac50sub_10000ac50
0x10000ad80sub_10000ad80
0x10000ae44sub_10000ae44
0x10000ae8csub_10000ae8c
0x10000af40sub_10000af40
0x10000af84sub_10000af84
0x10000b058sub_10000b058
0x10000b1bcsub_10000b1bc
0x10000b2e0sub_10000b2e0
Imports60 symbols from 4 dylibs
Exports1
_mh_execute_header0x0