cpio

JSON
executablemacOS195.4 KBx86_64, arm64

Unknown utility — purpose cannot be determined from available metadata

This Apple-signed executable contains 37 functions and references 10 bundle identifiers, suggesting integration with multiple system or application components. It initiates 7 network connections to unspecified endpoints and accesses 9 file paths on disk. The binary's actual purpose cannot be reliably determined without examining its code logic, function names, or runtime behavior. Security analysis requires either additional context about the binary's origin or dynamic execution monitoring.AI

Fingerprint

Platform
macOS
Type
executable
Arch
x86_64, arm64
Min OS
26.1.0
SDK
26.1.0
File Size
195.4 KB
UUID
14626DCD-77F6-3855-8FD2-D5BBC43D1C0A
Analyzed
2026-04-07T05:21:14Z
CDHash
e3b435d4671248ba22aa33b71eeaebad88db642e844032872279ef56853674b6

Interesting Strings

Bundle IDs(10)

File Paths(9)

Network Surface

DNA Capability Vector

Location
0
Keychain
0
Network
0
Storage
0
Hardware
0
IPC
0
Analytics
0
Security
0
System
0

Behavioral Profile

URL Endpoints
4
Telemetry Strings
0
File Paths
9
Bundle IDs
10
IOKit Constants
0
Library Functions
0

Structural HashesSHA-256

Static Libraries0 / 37 functions identified

Functions(37)

0x100000660cpio_getopt
0x100000c7cowner_parse
0x100001030main
0x100001b54sub_100001b54
0x100001d3clong_help
0x100001e5cusage
0x100001f1cversion
0x100001f70mode_out
0x1000025b4mode_list
0x10000289cmode_in
0x100002dd0mode_pass
0x100003110free_cache
0x100003198passphrase_free
0x1000031e4cpio_i64toa
0x1000032c4passphrase_callback
0x10000335cfile_to_archive
0x100003714entry_to_archive
0x100003b80remove_leading_slash
0x100003e60cpio_rename
0x100004038restore_time

Imports146 symbols from 2 dylibs

Exports9

_mh_execute_header0x0
lafe_errc0x4d2c
lafe_getprogname0x4b98
lafe_line_reader0x4df8
lafe_line_reader_free0x5360
lafe_line_reader_next0x4f38
lafe_readpassphrase0x4d70
lafe_setprogname0x4ba4
lafe_warnc0x4c24