sndfile-deinterleave

JSON
executablemacOS35.0 KBarm64

Unknown utility — insufficient metadata for classification

This ad-hoc signed arm64 executable lacks identifying information necessary for functional analysis. The binary contains 12 functions and links against 2 frameworks, but without symbol names, strings, or entry point analysis, its purpose cannot be determined. Security analysts should obtain additional context about how this binary is invoked, what processes spawn it, and its filesystem location to classify its role.AI

Fingerprint

Platform
macOS
Type
executable
Arch
arm64
Min OS
15.0.0
SDK
15.2.0
File Size
35.0 KB
UUID
46D18D81-7F82-3E4A-A98D-2F48C2BC4334
Analyzed
2026-04-09T09:16:47Z
CDHash
f244be4290468b549bc8dc4a11818d1fe2d05f5ebd22c733f80e0a0e7e8fdc08

DNA Capability Vector

Location
0
Keychain
0
Network
0
Storage
0
Hardware
0
IPC
0
Analytics
0
Security
0
System
0

Behavioral Profile

URL Endpoints
0
Telemetry Strings
0
File Paths
0
Bundle IDs
0
IOKit Constants
0
Library Functions
2

Structural HashesSHA-256

Static Libraries2 / 12 functions identified

Functions(12)

0x1000024d8main
0x1000027f0deinterleave_double
0x1000028b8deinterleave_int
0x100002980sfe_copy_data_fp
0x100002b0csfe_copy_data_int
0x100002b80sfe_apply_metadata_changes
0x10000313csfe_file_type_of_ext
0x100003254sfe_dump_format_map
0x100003348program_name
0x100003398sfe_endian_name
0x1000033acsfe_container_name
0x1000033e0sfe_codec_name

Imports34 symbols from 2 dylibs

Exports11

_mh_execute_header0x0
main0x24d8
program_name0x3348
sfe_apply_metadata_changes0x2b80
sfe_codec_name0x33e0
sfe_container_name0x33ac
sfe_copy_data_fp0x2980
sfe_copy_data_int0x2b0c
sfe_dump_format_map0x3254
sfe_endian_name0x3398
sfe_file_type_of_ext0x313c