Lines Matching refs:executable
12 # text if readable, executable if runnable binary, data if unreadable.
27 16 lelong 0xef000011 RISC OS AIF executable
89 >18 lelong &02 executable,
226 0 short 0420 0420 Alliant virtual executable
229 0 short 0421 0421 Alliant compact executable
239 >22 leshort&030000 !020000 executable
285 0 belong 0x000003f3 AmigaOS loadseg()ble executable/binary
1494 # aout: file(1) magic for a.out executable/object/etc entries that
1508 0 lelong 0407 a.out little-endian 32-bit executable
1512 0 lelong 0410 a.out little-endian 32-bit pure executable
1516 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable
1528 0 belong 0407 a.out big-endian 32-bit executable
1531 0 belong 0410 a.out big-endian 32-bit pure executable
1534 0 belong 0413 a.out big-endian 32-bit demand paged executable
1702 # Note there might be some problems with the "VAX COFF executable"
1790 0 belong 0xfade0cc0 Mac OS X Detached Code Signature (non-executable)
2214 # BatComp left out: sig looks like COM executable
2612 5 string -pc1- PopCom compressed executable (CP/M)
2862 #0 beshort 0550 3b20 COFF executable
2865 #0 beshort 0551 3b20 COFF executable (TV)
2873 >18 beshort &00000020 executable
2883 0 beshort 0561 WE32000 COFF executable (TV)
3619 0 string bFLT BFLT executable
3709 #0 long 0407 68K Blit (standalone) executable
3710 #0 short 0407 VAX-order2 68K Blit (standalone) executable
3711 0 short 03401 VAX-order 68K Blit (standalone) executable
3712 0 long 0406 68k Blit mpx/mux executable
3713 0 short 0406 VAX-order2 68k Blit mpx/mux executable
3714 0 short 03001 VAX-order 68k Blit mpx/mux executable
3717 #0 short 0520 tty630 layers executable
3733 # Some object/executable formats use the same magic numbers as are used
3737 0 lelong 0314 386 compact demand paged pure executable
3745 >>20 belong =4096 dynamically linked executable
3746 >>20 belong >4096 dynamically linked executable
3747 >0 byte ^0x80 executable
3752 >0 byte &0x80 dynamically linked executable
3753 >0 byte ^0x80 executable
3758 >0 byte &0x80 dynamically linked executable
3759 >0 byte ^0x80 executable
4277 0 short 0575 CLIPPER COFF executable (VAX #)
4285 0 short 0577 CLIPPER COFF executable
4318 0 string/wt #!\ /bin/sh POSIX shell script text executable
4320 0 string/wb #!\ /bin/sh POSIX shell script executable (binary data)
4323 0 string/wt #!\ /bin/csh C shell script text executable
4327 0 string/wt #!\ /bin/ksh Korn shell script text executable
4329 0 string/wb #!\ /bin/ksh Korn shell script executable (binary data)
4332 0 string/wt #!\ /bin/tcsh Tenex C shell script text executable
4334 0 string/wt #!\ /usr/bin/tcsh Tenex C shell script text executable
4336 0 string/wt #!\ /usr/local/tcsh Tenex C shell script text executable
4338 0 string/wt #!\ /usr/local/bin/tcsh Tenex C shell script text executable
4343 0 string/wt #!\ /bin/zsh Paul Falstad's zsh script text executable
4345 0 string/wt #!\ /usr/bin/zsh Paul Falstad's zsh script text executable
4347 0 string/wt #!\ /usr/local/bin/zsh Paul Falstad's zsh script text executable
4349 0 string/wt #!\ /usr/local/bin/ash Neil Brown's ash script text executable
4351 0 string/wt #!\ /usr/local/bin/ae Neil Brown's ae script text executable
4353 0 string/wt #!\ /bin/nawk new awk script text executable
4355 0 string/wt #!\ /usr/bin/nawk new awk script text executable
4357 0 string/wt #!\ /usr/local/bin/nawk new awk script text executable
4359 0 string/wt #!\ /bin/gawk GNU awk script text executable
4361 0 string/wt #!\ /usr/bin/gawk GNU awk script text executable
4363 0 string/wt #!\ /usr/local/bin/gawk GNU awk script text executable
4366 0 string/wt #!\ /bin/awk awk script text executable
4368 0 string/wt #!\ /usr/bin/awk awk script text executable
4373 0 string/wt #!\ /bin/rc Plan 9 rc shell script text executable
4376 0 string/wt #!\ /bin/bash Bourne-Again shell script text executable
4378 0 string/wb #!\ /bin/bash Bourne-Again shell script executable (binary data)
4380 0 string/wt #!\ /usr/bin/bash Bourne-Again shell script text executable
4382 0 string/wb #!\ /usr/bin/bash Bourne-Again shell script executable (binary data)
4384 0 string/wt #!\ /usr/local/bash Bourne-Again shell script text executable
4386 0 string/wb #!\ /usr/local/bash Bourne-Again shell script executable (binary data)
4388 0 string/wt #!\ /usr/local/bin/bash Bourne-Again shell script text executable
4390 0 string/wb #!\ /usr/local/bin/bash Bourne-Again shell script executable (binary data)
4402 0 search/1/w #!\ /usr/local/bin/php PHP script text executable
4405 0 search/1/w #!\ /usr/bin/php PHP script text executable
4841 0 string PS-X\ EXE Sony Playstation executable
4847 0 string XBEH XBE, Microsoft Xbox executable
4984 0 belong 0513 Convex old-style demand paged executable
4986 0 belong 0515 Convex old-style pre-paged executable
4988 0 belong 0517 Convex old-style pre-paged, non-swapped executable
5020 >84 belong &0x80000000 executable
5763 >>22 leshort&030000 !020000 executable
6091 >16 leshort 2 executable,
6092 !:mime application/x-executable
6403 >20 short 0x107 executable
6404 >20 short 0x108 pure executable
6405 >20 short 0x10b demand-paged executable
6406 >20 short 0x10f unsupported executable
6411 0 short 0x155 Encore unsupported executable
6477 0 lelong 0x1000007A Psion Series 5 executable
9089 # schemes for distinguishing between executable images, shared libraries,
9103 # an executable, and is dynamically-linked if the "has run-time
9111 # a dynamically-linked executable;
9118 # if the entry point is non-zero, it's an executable, otherwise
9124 # a dynamically-linked executable, otherwise it's just an
9125 # executable.
9135 # it's a dynamically-linked executable);
9138 # set, then it's just an executable.
9161 >>3 byte&0x80 0x80 dynamically linked executable
9162 >>3 byte&0x80 0x00 executable
9171 >>3 byte&0x80 0x80 dynamically linked executable
9172 >>3 byte&0x80 0x00 executable
9181 >>3 byte&0x80 0x80 dynamically linked executable
9182 >>3 byte&0x80 0x00 executable
9191 >>3 byte&0x80 0x80 dynamically linked executable
9192 >>3 byte&0x80 0x00 executable
9706 >40 byte 1 executable
10263 >18 beshort&0x0002 =0x0002 executable
10269 >18 leshort&0x0002 =0x0002 executable
10314 0 beshort 0627 Apollo m68k COFF executable
10317 0 beshort 0624 apollo a88k COFF executable
10326 0 belong 0x02100107 PA-RISC1.1 executable
10331 0 belong 0x02100108 PA-RISC1.1 shared executable
10336 0 belong 0x0210010b PA-RISC1.1 demand-load executable
10350 0 belong 0x02140107 PA-RISC2.0 executable
10355 0 belong 0x02140108 PA-RISC2.0 shared executable
10360 0 belong 0x0214010b PA-RISC2.0 demand-load executable
10374 0 belong 0x020b0107 PA-RISC1.0 executable
10379 0 belong 0x020b0108 PA-RISC1.0 shared executable
10384 0 belong 0x020b010b PA-RISC1.0 demand-load executable
10402 0 long 0x02080106 HP s500 relocatable executable
10405 0 long 0x02080107 HP s500 executable
10408 0 long 0x02080108 HP s500 pure executable
10412 0 belong 0x020c0108 HP s200 pure executable
10419 0 belong 0x020c0107 HP s200 executable
10426 0 belong 0x020c010b HP s200 demand-load executable
10433 0 belong 0x020c0106 HP s200 relocatable executable
10440 0 belong 0x020a0108 HP s200 (2.x release) pure executable
10444 0 belong 0x020a0107 HP s200 (2.x release) executable
10724 #>0 string HU X executable
10729 #0 beshort 0x601a Human68k Z executable
10736 #>4 string LZX R executable
10737 #2 string #HUPAIR Human68k hupair R executable
10743 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable".
10747 # 0 short 0535 370 sysV executable
10751 # 0 short 0530 370 sysV pure executable
10758 0 beshort 0537 370 XA sysV executable
10762 0 beshort 0532 370 XA sysV pure executable
10766 0 beshort 054001 370 sysV pure executable
10768 0 beshort 055001 370 XA sysV pure executable
10770 0 beshort 056401 370 sysV executable
10772 0 beshort 057401 370 XA sysV executable
10774 0 beshort 0531 SVR2 executable (Amdahl-UTS)
10777 0 beshort 0534 SVR2 pure executable (Amdahl-UTS)
10780 0 beshort 0530 SVR2 pure executable (USS/370)
10783 0 beshort 0535 SVR2 executable (USS/370)
10791 0 beshort 0x01df executable (RISC System/6000 V3.1) or obj module
10794 #0 beshort 0x0103 executable (RT Version 2) or obj module
10806 0 beshort 0x01f7 64-bit XCOFF executable or object module
10937 >>24 string Exec with executable chunk
12076 # Various flavors of x86 UNIX executable/object (other than Xenix, which
12087 0 leshort 0502 basic-16 executable
12090 0 leshort 0503 basic-16 executable (TV)
12093 0 leshort 0510 x86 executable
12095 0 leshort 0511 x86 executable (TV)
12097 0 leshort =0512 iAPX 286 executable small model (COFF)
12100 0 leshort =0522 iAPX 286 executable large model (COFF)
12103 # SGI labeled the next entry as "iAPX 386 executable" --Dan Quinlan
12104 0 leshort =0514 80386 COFF executable
12246 0 search/1/w #!/bin/node Node.js script text executable
12248 0 search/1/w #!/usr/bin/node Node.js script text executable
12250 0 search/1/w #!/bin/nodejs Node.js script text executable
12252 0 search/1/w #!/usr/bin/nodejs Node.js script text executable
12254 0 search/1 #!/usr/bin/env\ node Node.js script text executable
12256 0 search/1 #!/usr/bin/env\ nodejs Node.js script text executable
12531 # >0 leshort 0407 impure executable (OMAGIC)
12532 # >0 leshort 0410 pure executable (NMAGIC)
12533 # >0 leshort 0413 demand-paged executable (ZMAGIC)
12534 # >0 leshort 0314 demand-paged executable (QMAGIC)
12536 0 lelong 0x00640107 Linux/i386 impure executable (OMAGIC)
12538 0 lelong 0x00640108 Linux/i386 pure executable (NMAGIC)
12540 0 lelong 0x0064010b Linux/i386 demand-paged executable (ZMAGIC)
12542 0 lelong 0x006400cc Linux/i386 demand-paged executable (QMAGIC)
12548 0 string \01\03\020\04 Linux-8086 impure executable
12550 0 string \01\03\040\04 Linux-8086 executable
12555 0 string \01\03\020\20 Minix-386 impure executable
12557 0 string \01\03\040\20 Minix-386 executable
12559 0 string \01\03\04\20 Minix-386 NSYM/GNU executable
12568 # this can be overridden by the DOS executable (COM) entry
12626 >510 leshort 0xAA55 x86 boot executable
12716 36 lelong 0x016f2818 Linux kernel ARM boot executable zImage (little-endian)
12717 36 belong 0x016f2818 Linux kernel ARM boot executable zImage (big-endian)
12720 # Linux 8086 executable
12721 0 lelong&0xFF0000FF 0xC30000E9 Linux-Dev86 executable, headerless
12725 0 lelong&0xFF00FFFF 0x4000301 Linux-8086 executable
12739 # 0 lelong&0xFF00FFFF 0x10000301 ld86 I80386 executable
12740 # 0 lelong&0xFF00FFFF 0xB000301 ld86 M68K executable
12741 # 0 lelong&0xFF00FFFF 0xC000301 ld86 NS16K executable
12742 # 0 lelong&0xFF00FFFF 0x17000301 ld86 SPARC executable
13036 0 search/1/w #!\ /usr/bin/lua Lua script text executable
13038 0 search/1/w #!\ /usr/local/bin/lua Lua script text executable
13040 0 search/1 #!/usr/bin/env\ lua Lua script text executable
13042 0 search/1 #!\ /usr/bin/env\ lua Lua script text executable
13262 >12 belong 2 executable
13265 >12 belong 5 preload executable
14087 0 beshort 0x0160 MIPSEB ECOFF executable
14096 0 beshort 0x0162 MIPSEL-BE ECOFF executable
14105 0 beshort 0x6001 MIPSEB-LE ECOFF executable
14114 0 beshort 0x6201 MIPSEL ECOFF executable
14125 0 beshort 0x0163 MIPSEB MIPS-II ECOFF executable
14134 0 beshort 0x0166 MIPSEL-BE MIPS-II ECOFF executable
14143 0 beshort 0x6301 MIPSEB-LE MIPS-II ECOFF executable
14152 0 beshort 0x6601 MIPSEL MIPS-II ECOFF executable
14163 0 beshort 0x0140 MIPSEB MIPS-III ECOFF executable
14172 0 beshort 0x0142 MIPSEL-BE MIPS-III ECOFF executable
14181 0 beshort 0x4001 MIPSEB-LE MIPS-III ECOFF executable
14190 0 beshort 0x4201 MIPSEL MIPS-III ECOFF executable
14208 0 long 31415 Mirage Assembler m.out executable
14317 >18 beshort &00000020 executable
14324 0 beshort 0521 mc68k executable (shared)
14326 0 beshort 0522 mc68k executable (shared demand paged)
14331 0 beshort 0554 68K BCS executable
14337 0 beshort 0555 88K BCS executable
14349 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable
14354 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable
14361 0 beshort 0x601A Atari 68xxx executable,
14434 >0x18 leshort <0x40 MS-DOS executable
14448 >>>(0x3c.l+24) leshort 0x010b \b32 executable
14449 >>>(0x3c.l+24) leshort 0x020b \b32+ executable
14496 # executable inside (which just prints a message and exits if run in win)
14525 >>(0x3c.l) string !PE\0\0 MS-DOS executable
14565 >>(0x3c.l) string LE\0\0 \b, LE executable
14594 # header data too small for extended executable
14605 # calculations (next embedded executable would be at &(&2*512+&0-2)
14626 # By now an executable type should have been printed out. The executable
14720 0 byte 0xe9 DOS executable (COM)
14726 0 ulequad&0x07a0ffffffff 0xffffffff DOS executable (
14791 #0 ulequad&0x000007a0ffffffed 0x0000000000000000 DOS-executable (
14797 0 byte 0x8c DOS executable (COM)
14799 0 ulelong 0xffff10eb DR-DOS executable (COM)
14804 >>0x1FE leshort 0xAA55 DOS executable (COM), boot code
14805 >>85 string UPX DOS executable (COM), UPX compressed
14806 >>4 string \ $ARX DOS executable (COM), ARX self-extracting archive
14807 >>4 string \ $LHarc DOS executable (COM), LHarc self-extracting archive
14808 >>0x20e string SFX\ by\ LARC DOS executable (COM), LARC self-extracting archive
14810 #0 byte 0xb8 COM executable
14813 >1 lelong !0x21cd4cff COM executable for DOS
14818 >1 lelong 0x21cd4cff COM executable (32-bit COMBOOT)
14822 0 string/b \xb8\xfe\x4c\xcd\x21 COM executable (COM32R)
14825 >1 lelong 0x21cd4cfe COM executable (32-bit COMBOOT, relocatable)
14828 >>36 string UPX! FREE-DOS executable (COM), UPX compressed
14829 252 string Must\ have\ DOS\ version DR-DOS executable (COM)
14832 #34 search/2 UPX! FREE-DOS executable (COM), UPX compressed
14833 34 string UPX! FREE-DOS executable (COM), UPX compressed
14834 35 string UPX! FREE-DOS executable (COM), UPX compressed
14836 #2 search/28 \xcd\x21 COM executable for MS-DOS
14838 2 string \xcd\x21 COM executable for DOS
14840 4 string \xcd\x21 COM executable for DOS
14842 5 string \xcd\x21 COM executable for DOS
14845 >0 byte !0xb8 COM executable for DOS
14848 >5 string !\xcd\x21 COM executable for DOS
14850 13 string \xcd\x21 COM executable for DOS
14852 18 string \xcd\x21 COM executable for MS-DOS
14854 23 string \xcd\x21 COM executable for MS-DOS
14856 30 string \xcd\x21 COM executable for MS-DOS
14858 70 string \xcd\x21 COM executable for DOS
14860 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
14861 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for DOS
14863 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
14867 0 string/b LZ MS-DOS executable (built-in)
15684 >20 beshort 0407 executable
15685 >20 beshort 0410 pure executable
15689 >20 beshort 0407 executable
15690 >20 beshort 0410 pure executable
15694 >20 beshort 0407 executable
15695 >20 beshort 0410 pure executable
15699 >20 beshort 0407 executable
15700 >20 beshort 0410 pure executable
15704 >20 beshort 0407 executable
15705 >20 beshort 0410 pure executable
15711 >20 beshort 0407 executable
15712 >20 beshort 0413 pure executable
15718 >20 beshort 0407 executable
15719 >20 beshort 0413 pure executable
15748 >>20 lelong =4096 dynamically linked executable
15749 >>20 lelong >4096 dynamically linked executable
15750 >0 byte ^0x80 executable
15753 >0 byte &0x80 dynamically linked executable
15754 >0 byte ^0x80 executable
15757 >0 byte &0x80 dynamically linked executable
15760 >>20 lelong !0 executable
15770 >>20 belong =8192 dynamically linked executable
15771 >>20 belong >8192 dynamically linked executable
15772 >0 byte ^0x80 executable
15775 >0 byte &0x80 dynamically linked executable
15776 >0 byte ^0x80 executable
15779 >0 byte &0x80 dynamically linked executable
15782 >>20 belong !0 executable
15792 >>20 belong =4096 dynamically linked executable
15793 >>20 belong >4096 dynamically linked executable
15794 >0 byte ^0x80 executable
15797 >0 byte &0x80 dynamically linked executable
15798 >0 byte ^0x80 executable
15801 >0 byte &0x80 dynamically linked executable
15804 >>20 belong !0 executable
15814 >>20 lelong =4096 dynamically linked executable
15815 >>20 lelong >4096 dynamically linked executable
15816 >0 byte ^0x80 executable
15819 >0 byte &0x80 dynamically linked executable
15820 >0 byte ^0x80 executable
15823 >0 byte &0x80 dynamically linked executable
15826 >>20 lelong !0 executable
15839 >>20 belong =8192 dynamically linked executable
15840 >>20 belong >8192 dynamically linked executable
15841 >0 byte ^0x80 executable
15844 >0 byte &0x80 dynamically linked executable
15845 >0 byte ^0x80 executable
15848 >0 byte &0x80 dynamically linked executable
15851 >>20 belong !0 executable
15861 >>20 lelong =4096 dynamically linked executable
15862 >>20 lelong >4096 dynamically linked executable
15863 >0 byte ^0x80 executable
15866 >0 byte &0x80 dynamically linked executable
15867 >0 byte ^0x80 executable
15870 >0 byte &0x80 dynamically linked executable
15873 >>20 lelong !0 executable
15883 >>20 lelong =4096 dynamically linked executable
15884 >>20 lelong >4096 dynamically linked executable
15885 >0 byte ^0x80 executable
15888 >0 byte &0x80 dynamically linked executable
15889 >0 byte ^0x80 executable
15892 >0 byte &0x80 dynamically linked executable
15895 >>20 lelong !0 executable
15905 >>20 lelong =4096 dynamically linked executable
15906 >>20 lelong >4096 dynamically linked executable
15907 >0 byte ^0x80 executable
15910 >0 byte &0x80 dynamically linked executable
15911 >0 byte ^0x80 executable
15914 >0 byte &0x80 dynamically linked executable
15917 >>20 lelong !0 executable
15937 >>20 belong =8192 dynamically linked executable
15938 >>20 belong >8192 dynamically linked executable
15939 >0 byte ^0x80 executable
15942 >0 byte &0x80 dynamically linked executable
15943 >0 byte ^0x80 executable
15946 >0 byte &0x80 dynamically linked executable
15949 >>20 belong !0 executable
15959 >>20 lelong =4096 dynamically linked executable
15960 >>20 lelong >4096 dynamically linked executable
15961 >0 byte ^0x80 executable
15964 >0 byte &0x80 dynamically linked executable
15965 >0 byte ^0x80 executable
15968 >0 byte &0x80 dynamically linked executable
15971 >>20 lelong !0 executable
16161 >>16 leshort 2 executable,
16194 >>16 beshort 2 executable,
16345 >6 byte&0x0f 0x00 non-executable
16353 >6 byte&0xf0 0x10 program executable
16384 >0x12 byte 1 program executable
16568 >19 byte&0x02 0x02 executable
16647 # pdp: file(1) magic for PDP-11 executable/object and APL workspace
16654 0 leshort 0407 PDP-11 executable
16667 0 leshort 0410 PDP-11 pure executable
16671 0 leshort 0411 PDP-11 separate I&D executable
16678 0 leshort 0413 PDP-11 demand-paged pure executable
16681 0 leshort 0430 PDP-11 overlaid pure executable
16684 0 leshort 0431 PDP-11 overlaid separate executable
16701 0 search/1 #!/usr/bin/env\ perl Perl script text executable
16703 0 search/1 #!\ /usr/bin/env\ perl Perl script text executable
16706 >0 regex \^#!.*/bin/perl([[:space:]].*)*$ Perl script text executable
17310 0 belong 0x00000107 Plan 9 executable, Motorola 68k
17311 0 belong 0x000001EB Plan 9 executable, Intel 386
17312 0 belong 0x00000247 Plan 9 executable, Intel 960
17313 0 belong 0x000002AB Plan 9 executable, SPARC
17314 0 belong 0x00000407 Plan 9 executable, MIPS R3000
17315 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210
17316 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE
17317 0 belong 0x000005AB Plan 9 executable, AMD 29000
17318 0 belong 0x00000647 Plan 9 executable, ARM 7-something
17319 0 belong 0x000006EB Plan 9 executable, PowerPC
17320 0 belong 0x00000797 Plan 9 executable, MIPS R4000 LE
17321 0 belong 0x0000084B Plan 9 executable, DEC Alpha
17542 0 long 0x50900107 Pyramid 90x family executable
17543 0 long 0x50900108 Pyramid 90x family pure executable
17545 0 long 0x5090010b Pyramid 90x family demand paged pure executable
17555 0 string/t """ Python script text executable
17574 0 search/1/w #!\ /usr/bin/python Python script text executable
17576 0 search/1/w #!\ /usr/local/bin/python Python script text executable
17578 0 search/1 #!/usr/bin/env\ python Python script text executable
17580 0 search/1 #!\ /usr/bin/env\ python Python script text executable
17585 0 regex \^from\\s+(\\w|\\.)+\\s+import.*$ Python script text executable
17590 >&0 search/64 self Python script text executable
17595 #>&0 regex .*'''$ Python script text executable
17599 #>&0 regex .*"""$ Python script text executable
17606 >&0 regex \^\\s*except.*: Python script text executable
17608 >&0 search/4096 finally: Python script text executable
17613 >&0 regex \ {0,50}\\(([a-zA-Z]|,|\ ){1,255}\\):$ Python script text executable
18108 0 search/1/w #!\ /usr/bin/ruby Ruby script text executable
18110 0 search/1/w #!\ /usr/local/bin/ruby Ruby script text executable
18112 0 search/1 #!/usr/bin/env\ ruby Ruby script text executable
18114 0 search/1 #!\ /usr/bin/env\ ruby Ruby script text executable
18323 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0)
18326 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0)
18329 0 lelong 0x30ea BALANCE NS32000 standalone executable
18339 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0)
18342 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0)
18347 #0 leshort 0x42eb SYMMETRY i386 standalone executable
18352 >>124 lelong !28867614 SYMMETRY i386 standalone executable
18690 0 string NqNqNq`\004 QL firmware executable (BCPL)
18697 4 belong 0x4AFB QDOS executable
19288 >>20 belong =4096 dynamically linked executable
19289 >>20 belong >4096 dynamically linked executable
19290 >0 byte ^0x80 executable
19294 >0 byte &0x80 dynamically linked executable
19295 >0 byte ^0x80 executable
19299 >0 byte &0x80 dynamically linked executable
19300 >0 byte ^0x80 executable
19306 >>20 belong =4096 dynamically linked executable
19307 >>20 belong >4096 dynamically linked executable
19308 >0 byte ^0x80 executable
19312 >0 byte &0x80 dynamically linked executable
19313 >0 byte ^0x80 executable
19317 >0 byte &0x80 dynamically linked executable
19318 >0 byte ^0x80 executable
19324 >>20 belong =4096 dynamically linked executable
19325 >>20 belong >4096 dynamically linked executable
19326 >0 byte ^0x80 executable
19330 >0 byte &0x80 dynamically linked executable
19331 >0 byte ^0x80 executable
19335 >0 byte &0x80 dynamically linked executable
19336 >0 byte ^0x80 executable
19422 0x30 string SymExe SymbOS executable
19783 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable
19785 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable
19787 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable
19789 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable
19791 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable
19793 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable
19795 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable
19797 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
20315 # (executable, pure, and split I&D, respectively), but the PDP-11 version
20328 #0 short 0x107 unknown machine executable
20331 #0 short 0x108 unknown pure executable
20337 #0 short 0x10b unknown pure executable
20340 0 long 0x10c unknown demand paged pure executable
20342 0 long 0x10e unknown readable demand paged pure executable
20399 0 short 0610 Perkin-Elmer executable
20401 0 beshort 0572 amd 29k coff noprebar executable
20402 0 beshort 01572 amd 29k coff prebar executable
20405 6 beshort 0407 unicos (cray) executable
20411 0 string Joy!peffpwpc header for PowerPC PEF executable
20428 # 0 string exec BugOS executable
20441 >3 string >\0 %s script text executable
20445 >3 string >\0 %s script executable (binary data)
20449 >3 string >\0 %s script text executable
20453 >3 string >\0 %s script executable (binary data)
20457 >2 string >\0 %s script text executable
20461 >2 string >\0 %s script executable (binary data)
20464 0 string/t #!\ script text executable
20468 0 string/b #!\ script executable
20474 >15 string/t >\0 %s script text executable
20478 >15 string/b >\0 %s script executable (binary data)
20482 >16 string/t >\0 %s script text executable
20486 >16 string/b >\0 %s script executable (binary data)
20498 # vax: file(1) magic for VAX executable/object and APL workspace
20507 0 lelong 0420 a.out VAX demand paged (first page unmapped) pure executable
20516 0 leshort 0570 VAX COFF executable
20519 0 leshort 0575 VAX COFF pure executable
20720 0 string \xb0\0\x30\0 VMS VAX executable
20734 >8 ubelong 0xec020000 VMS Alpha executable
20923 # For format usable in DOS, such as generic executable
21503 >0x1e leshort &0x1 executable
21513 >0 byte &0x1 executable
21523 >0x1e leshort &0x1 executable
21594 >6 leshort&0x1000 =0x0000 executable,