pango-segmentation

JSON
executablemacOS52.9 KBarm64

Unknown executable — purpose unclear from static analysis

A 52.9 KB ad-hoc signed ARM64 executable with minimal public framework dependencies and 13 identifiable functions. Without access to the binary's strings, entry point behavior, or runtime analysis, the specific purpose cannot be determined from the metadata alone. The small size and function count suggest a utility or helper tool rather than a system service. Security analysts should perform dynamic analysis or reverse engineering to establish what this executable does.AI

Fingerprint

Platform
macOS
Type
executable
Arch
arm64
Min OS
26.0.0
SDK
26.0.0
File Size
52.9 KB
UUID
E9783A59-3143-3000-855C-0E449917696C
Analyzed
2026-04-09T09:12:37Z
CDHash
eeca9075ff68c471b8db494d7cc65c3629ac04975c0a5eb77e1daa9a71f8de95

DNA Capability Vector

Location
0
Keychain
0
Network
0
Storage
0
Hardware
0
IPC
0
Analytics
0
Security
0
System
0

Behavioral Profile

URL Endpoints
0
Telemetry Strings
0
File Paths
0
Bundle IDs
0
IOKit Constants
0
Library Functions
1

Structural HashesSHA-256

Static Libraries1 / 13 functions identified

Identified Libraries

Functions(13)

0x100001b48main
0x100002168OUTLINED_FUNCTION_0
0x100002174OUTLINED_FUNCTION_1
0x100002180OUTLINED_FUNCTION_2
0x10000218cOUTLINED_FUNCTION_3
0x100002198main.cold.1
0x1000021b4main.cold.2
0x1000021d0main.cold.3
0x1000021ecmain.cold.4
0x100002208main.cold.5
0x100002224main.cold.6
0x100002240main.cold.7
0x10000225cmain.cold.8

Imports37 symbols from 5 dylibs

Exports1

_mh_execute_header0x0