Lines Matching refs:executable
12 # text if readable, executable if runnable binary, data if unreadable.
27 16 lelong 0xef000011 RISC OS AIF executable
122 >18 lelong &02 executable,
290 0 short 0420 0420 Alliant virtual executable
293 0 short 0421 0421 Alliant compact executable
317 0 belong 0x000003f3 AmigaOS loadseg()ble executable/binary
1590 # aout: file(1) magic for a.out executable/object/etc entries that
1604 0 lelong 0407 a.out little-endian 32-bit executable
1608 0 lelong 0410 a.out little-endian 32-bit pure executable
1612 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable
1624 0 belong 0407 a.out big-endian 32-bit executable
1627 0 belong 0410 a.out big-endian 32-bit pure executable
1630 0 belong 0413 a.out big-endian 32-bit demand paged executable
1856 # Note there might be some problems with the "VAX COFF executable"
1944 0 belong 0xfade0cc0 Mac OS X Detached Code Signature (non-executable)
2787 # BatComp left out: sig looks like COM executable
3392 5 string -pc1- PopCom compressed executable (CP/M)
3665 #0 beshort 0550 3b20 COFF executable
3668 #0 beshort 0551 3b20 COFF executable (TV)
3676 >18 beshort &00000020 executable
3686 0 beshort 0561 WE32000 COFF executable (TV)
4682 0 string bFLT BFLT executable
4960 #0 long 0407 68K Blit (standalone) executable
4961 #0 short 0407 VAX-order2 68K Blit (standalone) executable
4962 0 short 03401 VAX-order 68K Blit (standalone) executable
4963 0 long 0406 68k Blit mpx/mux executable
4964 0 short 0406 VAX-order2 68k Blit mpx/mux executable
4965 0 short 03001 VAX-order 68k Blit mpx/mux executable
4968 #0 short 0520 tty630 layers executable
4984 # Some object/executable formats use the same magic numbers as are used
4988 0 lelong 0314 386 compact demand paged pure executable
4996 >>20 belong =4096 dynamically linked executable
4997 >>20 belong >4096 dynamically linked executable
4998 >0 byte ^0x80 executable
5003 >0 byte &0x80 dynamically linked executable
5004 >0 byte ^0x80 executable
5009 >0 byte &0x80 dynamically linked executable
5010 >0 byte ^0x80 executable
5595 0 short 0575 CLIPPER COFF executable (VAX #)
5603 0 short 0577 CLIPPER COFF executable
5650 # DJGPP, 80386 COFF executable, MS Windows COFF Intel 80386 object file (./intel)
5656 # executable (RISC System/6000 V3.1) or obj module (./ibm6000)
5667 >>18 leshort &0x0002 executable
5713 0 string/wt #!\ /bin/sh POSIX shell script text executable
5715 0 string/wb #!\ /bin/sh POSIX shell script executable (binary data)
5718 0 string/wt #!\ /bin/csh C shell script text executable
5722 0 string/wt #!\ /bin/ksh Korn shell script text executable
5724 0 string/wb #!\ /bin/ksh Korn shell script executable (binary data)
5727 0 string/wt #!\ /bin/tcsh Tenex C shell script text executable
5729 0 string/wt #!\ /usr/bin/tcsh Tenex C shell script text executable
5731 0 string/wt #!\ /usr/local/tcsh Tenex C shell script text executable
5733 0 string/wt #!\ /usr/local/bin/tcsh Tenex C shell script text executable
5738 0 string/wt #!\ /bin/zsh Paul Falstad's zsh script text executable
5740 0 string/wt #!\ /usr/bin/zsh Paul Falstad's zsh script text executable
5742 0 string/wt #!\ /usr/local/bin/zsh Paul Falstad's zsh script text executable
5744 0 string/wt #!\ /usr/local/bin/ash Neil Brown's ash script text executable
5746 0 string/wt #!\ /usr/local/bin/ae Neil Brown's ae script text executable
5748 0 string/wt #!\ /bin/nawk new awk script text executable
5750 0 string/wt #!\ /usr/bin/nawk new awk script text executable
5752 0 string/wt #!\ /usr/local/bin/nawk new awk script text executable
5754 0 string/wt #!\ /bin/gawk GNU awk script text executable
5756 0 string/wt #!\ /usr/bin/gawk GNU awk script text executable
5758 0 string/wt #!\ /usr/local/bin/gawk GNU awk script text executable
5761 0 string/wt #!\ /bin/awk awk script text executable
5763 0 string/wt #!\ /usr/bin/awk awk script text executable
5768 0 string/wt #!\ /bin/rc Plan 9 rc shell script text executable
5771 0 string/wt #!\ /bin/bash Bourne-Again shell script text executable
5773 0 string/wb #!\ /bin/bash Bourne-Again shell script executable (binary data)
5775 0 string/wt #!\ /usr/bin/bash Bourne-Again shell script text executable
5777 0 string/wb #!\ /usr/bin/bash Bourne-Again shell script executable (binary data)
5779 0 string/wt #!\ /usr/local/bash Bourne-Again shell script text executable
5781 0 string/wb #!\ /usr/local/bash Bourne-Again shell script executable (binary data)
5783 0 string/wt #!\ /usr/local/bin/bash Bourne-Again shell script text executable
5785 0 string/wb #!\ /usr/local/bin/bash Bourne-Again shell script executable (binary data)
5787 0 string/wt #!\ /usr/bin/env\ bash Bourne-Again shell script text executable
5799 0 search/1/w #!\ /usr/local/bin/php PHP script text executable
5802 0 search/1/w #!\ /usr/bin/php PHP script text executable
6661 0 string PS-X\ EXE Sony Playstation executable
6678 0 string CPE CPE executable
6683 0 string XBEH XBE, Microsoft Xbox executable
7100 0 belong 0513 Convex old-style demand paged executable
7102 0 belong 0515 Convex old-style pre-paged executable
7104 0 belong 0517 Convex old-style pre-paged, non-swapped executable
7136 >84 belong &0x80000000 executable
8253 >>22 leshort&030000 !020000 executable
8635 >16 leshort 2 executable,
8636 !:mime application/x-executable
8637 >16 leshort 3 ${x?pie executable:shared object},
8639 !:mime application/x-${x?pie-executable:sharedlib}
8644 >>16 leshort 0xFE01 executable,
8645 !:mime application/x-executable
8925 >20 short 0x107 executable
8926 >20 short 0x108 pure executable
8927 >20 short 0x10b demand-paged executable
8928 >20 short 0x10f unsupported executable
8933 0 short 0x155 Encore unsupported executable
8999 0 lelong 0x1000007A Psion Series 5 executable
11995 # schemes for distinguishing between executable images, shared libraries,
12009 # an executable, and is dynamically-linked if the "has run-time
12017 # a dynamically-linked executable;
12024 # if the entry point is non-zero, it's an executable, otherwise
12030 # a dynamically-linked executable, otherwise it's just an
12031 # executable.
12041 # it's a dynamically-linked executable);
12044 # set, then it's just an executable.
12067 >>3 byte&0x80 0x80 dynamically linked executable
12068 >>3 byte&0x80 0x00 executable
12077 >>3 byte&0x80 0x80 dynamically linked executable
12078 >>3 byte&0x80 0x00 executable
12087 >>3 byte&0x80 0x80 dynamically linked executable
12088 >>3 byte&0x80 0x00 executable
12097 >>3 byte&0x80 0x80 dynamically linked executable
12098 >>3 byte&0x80 0x00 executable
12673 >40 byte 1 executable
12814 # mo extension is also used for Easeus Partition Master PE32 executable module
13410 0 beshort 0627 Apollo m68k COFF executable
13413 0 beshort 0624 apollo a88k COFF executable
13422 0 belong 0x02100107 PA-RISC1.1 executable
13427 0 belong 0x02100108 PA-RISC1.1 shared executable
13432 0 belong 0x0210010b PA-RISC1.1 demand-load executable
13446 0 belong 0x02140107 PA-RISC2.0 executable
13451 0 belong 0x02140108 PA-RISC2.0 shared executable
13456 0 belong 0x0214010b PA-RISC2.0 demand-load executable
13470 0 belong 0x020b0107 PA-RISC1.0 executable
13475 0 belong 0x020b0108 PA-RISC1.0 shared executable
13480 0 belong 0x020b010b PA-RISC1.0 demand-load executable
13498 0 long 0x02080106 HP s500 relocatable executable
13501 0 long 0x02080107 HP s500 executable
13504 0 long 0x02080108 HP s500 pure executable
13508 0 belong 0x020c0108 HP s200 pure executable
13515 0 belong 0x020c0107 HP s200 executable
13522 0 belong 0x020c010b HP s200 demand-load executable
13529 0 belong 0x020c0106 HP s200 relocatable executable
13536 0 belong 0x020a0108 HP s200 (2.x release) pure executable
13540 0 belong 0x020a0107 HP s200 (2.x release) executable
13820 #>0 string HU X executable
13825 #0 beshort 0x601a Human68k Z executable
13832 #>4 string LZX R executable
13833 #2 string #HUPAIR Human68k hupair R executable
13839 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable".
13843 # 0 short 0535 370 sysV executable
13847 # 0 short 0530 370 sysV pure executable
13854 0 beshort 0537 370 XA sysV executable
13858 0 beshort 0532 370 XA sysV pure executable
13862 0 beshort 054001 370 sysV pure executable
13864 0 beshort 055001 370 XA sysV pure executable
13866 0 beshort 056401 370 sysV executable
13868 0 beshort 057401 370 XA sysV executable
13870 0 beshort 0531 SVR2 executable (Amdahl-UTS)
13873 0 beshort 0534 SVR2 pure executable (Amdahl-UTS)
13876 0 beshort 0530 SVR2 pure executable (USS/370)
13879 0 beshort 0535 SVR2 executable (USS/370)
13887 0 beshort 0x01df executable (RISC System/6000 V3.1) or obj module
13890 #0 beshort 0x0103 executable (RT Version 2) or obj module
13902 0 beshort 0x01f7 64-bit XCOFF executable or object module
14197 >>24 string Exec with executable chunk
16009 # Various flavors of x86 UNIX executable/object (other than Xenix, which
16020 0 leshort 0502 basic-16 executable
16023 0 leshort 0503 basic-16 executable (TV)
16026 0 leshort 0510 x86 executable
16028 0 leshort 0511 x86 executable (TV)
16030 0 leshort =0512 iAPX 286 executable small model (COFF)
16033 0 leshort =0522 iAPX 286 executable large model (COFF)
16040 # ./intel (version 5.25) label labeled the next entry as "80386 COFF executable"
16041 # SGI labeled the next entry as "iAPX 386 executable" --Dan Quinlan
16198 0 search/1/w #!/bin/node Node.js script text executable
16200 0 search/1/w #!/usr/bin/node Node.js script text executable
16202 0 search/1/w #!/bin/nodejs Node.js script text executable
16204 0 search/1/w #!/usr/bin/nodejs Node.js script text executable
16206 0 search/1 #!/usr/bin/env\ node Node.js script text executable
16208 0 search/1 #!/usr/bin/env\ nodejs Node.js script text executable
16491 # >0 leshort 0407 impure executable (OMAGIC)
16492 # >0 leshort 0410 pure executable (NMAGIC)
16493 # >0 leshort 0413 demand-paged executable (ZMAGIC)
16494 # >0 leshort 0314 demand-paged executable (QMAGIC)
16496 0 lelong 0x00640107 Linux/i386 impure executable (OMAGIC)
16498 0 lelong 0x00640108 Linux/i386 pure executable (NMAGIC)
16500 0 lelong 0x0064010b Linux/i386 demand-paged executable (ZMAGIC)
16502 0 lelong 0x006400cc Linux/i386 demand-paged executable (QMAGIC)
16508 0 string \01\03\020\04 Linux-8086 impure executable
16510 0 string \01\03\040\04 Linux-8086 executable
16515 0 string \01\03\020\20 Minix-386 impure executable
16517 0 string \01\03\040\20 Minix-386 executable
16519 0 string \01\03\04\20 Minix-386 NSYM/GNU executable
16528 # this can be overridden by the DOS executable (COM) entry
16596 >510 leshort 0xAA55 x86 boot executable
16686 36 lelong 0x016f2818 Linux kernel ARM boot executable zImage (little-endian)
16687 36 belong 0x016f2818 Linux kernel ARM boot executable zImage (big-endian)
16690 # Linux 8086 executable
16691 0 lelong&0xFF0000FF 0xC30000E9 Linux-Dev86 executable, headerless
16695 0 lelong&0xFF00FFFF 0x4000301 Linux-8086 executable
16709 # 0 lelong&0xFF00FFFF 0x10000301 ld86 I80386 executable
16710 # 0 lelong&0xFF00FFFF 0xB000301 ld86 M68K executable
16711 # 0 lelong&0xFF00FFFF 0xC000301 ld86 NS16K executable
16712 # 0 lelong&0xFF00FFFF 0x17000301 ld86 SPARC executable
17073 0 search/1/w #!\ /usr/bin/lua Lua script text executable
17075 0 search/1/w #!\ /usr/local/bin/lua Lua script text executable
17077 0 search/1 #!/usr/bin/env\ lua Lua script text executable
17079 0 search/1 #!\ /usr/bin/env\ lua Lua script text executable
17309 >12 belong 2 executable
17312 >12 belong 5 preload executable
18368 0 beshort 0x0160 MIPSEB ECOFF executable
18377 0 beshort 0x0162 MIPSEL-BE ECOFF executable
18386 0 beshort 0x6001 MIPSEB-LE ECOFF executable
18395 0 beshort 0x6201 MIPSEL ECOFF executable
18406 0 beshort 0x0163 MIPSEB MIPS-II ECOFF executable
18415 0 beshort 0x0166 MIPSEL-BE MIPS-II ECOFF executable
18424 0 beshort 0x6301 MIPSEB-LE MIPS-II ECOFF executable
18433 0 beshort 0x6601 MIPSEL MIPS-II ECOFF executable
18444 0 beshort 0x0140 MIPSEB MIPS-III ECOFF executable
18453 0 beshort 0x0142 MIPSEL-BE MIPS-III ECOFF executable
18462 0 beshort 0x4001 MIPSEB-LE MIPS-III ECOFF executable
18471 0 beshort 0x4201 MIPSEL MIPS-III ECOFF executable
18489 0 long 31415 Mirage Assembler m.out executable
18675 >18 beshort &00000020 executable
18682 0 beshort 0521 mc68k executable (shared)
18684 0 beshort 0522 mc68k executable (shared demand paged)
18689 0 beshort 0554 68K BCS executable
18695 0 beshort 0555 88K BCS executable
18707 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable
18712 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable
18719 0 beshort 0x601A Atari 68xxx executable,
18788 # ./intel already labeled COFF type 0x14c=0514 as "80386 COFF executable"
18808 >0x18 leshort <0x40 MS-DOS executable
18822 >>>(0x3c.l+24) leshort 0x010b \b32 executable
18823 >>>(0x3c.l+24) leshort 0x020b \b32+ executable
18870 # executable inside (which just prints a message and exits if run in win)
18899 >>(0x3c.l) string !PE\0\0 MS-DOS executable
18939 >>(0x3c.l) string LE\0\0 \b, LE executable
18968 # header data too small for extended executable
18979 # calculations (next embedded executable would be at &(&2*512+&0-2)
19000 # By now an executable type should have been printed out. The executable
19093 0 name msdos-driver DOS executable (
19188 >>>4 ubyte >13 DOS executable (COM, 0x8C-variant)
19202 0 ulelong 0xffff10eb DR-DOS executable (COM)
19208 >0 byte x DOS executable (COM)
19243 # syslinux COM32 or COM32R executable
19244 >>1 lelong&0xFFFFFFFe 0x21CD4CFe COM executable (32-bit COMBOOT
19258 # "COM executable (COM32R)" or "Syslinux COM32 module" by TrID
19266 >>1 default x COM executable for DOS
19268 #!:mime application/x-ms-dos-executable
19274 >>36 string UPX! FREE-DOS executable (COM), UPX compressed
19275 252 string Must\ have\ DOS\ version DR-DOS executable (COM)
19278 #34 search/2 UPX! FREE-DOS executable (COM), UPX compressed
19279 34 string UPX! FREE-DOS executable (COM), UPX compressed
19280 35 string UPX! FREE-DOS executable (COM), UPX compressed
19282 #2 search/28 \xcd\x21 COM executable for MS-DOS
19284 2 string \xcd\x21 COM executable for DOS
19286 4 string \xcd\x21 COM executable for DOS
19288 5 string \xcd\x21 COM executable for DOS
19291 >0 byte !0xb8 COM executable for DOS
19294 >5 string !\xcd\x21 COM executable for DOS
19296 13 string \xcd\x21 COM executable for DOS
19298 18 string \xcd\x21 COM executable for MS-DOS
19300 23 string \xcd\x21 COM executable for MS-DOS
19302 30 string \xcd\x21 COM executable for MS-DOS
19304 70 string \xcd\x21 COM executable for DOS
19306 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
19307 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for DOS
19309 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
19313 0 string/b LZ MS-DOS executable (built-in)
20687 >20 beshort 0407 executable
20688 >20 beshort 0410 pure executable
20692 >20 beshort 0407 executable
20693 >20 beshort 0410 pure executable
20697 >20 beshort 0407 executable
20698 >20 beshort 0410 pure executable
20702 >20 beshort 0407 executable
20703 >20 beshort 0410 pure executable
20707 >20 beshort 0407 executable
20708 >20 beshort 0410 pure executable
20714 >20 beshort 0407 executable
20715 >20 beshort 0413 pure executable
20721 >20 beshort 0407 executable
20722 >20 beshort 0413 pure executable
20751 >>20 lelong =4096 dynamically linked executable
20752 >>20 lelong >4096 dynamically linked executable
20753 >0 byte ^0x80 executable
20756 >0 byte &0x80 dynamically linked executable
20757 >0 byte ^0x80 executable
20760 >0 byte &0x80 dynamically linked executable
20763 >>20 lelong !0 executable
20773 >>20 belong =8192 dynamically linked executable
20774 >>20 belong >8192 dynamically linked executable
20775 >0 byte ^0x80 executable
20778 >0 byte &0x80 dynamically linked executable
20779 >0 byte ^0x80 executable
20782 >0 byte &0x80 dynamically linked executable
20785 >>20 belong !0 executable
20795 >>20 belong =4096 dynamically linked executable
20796 >>20 belong >4096 dynamically linked executable
20797 >0 byte ^0x80 executable
20800 >0 byte &0x80 dynamically linked executable
20801 >0 byte ^0x80 executable
20804 >0 byte &0x80 dynamically linked executable
20807 >>20 belong !0 executable
20817 >>20 lelong =4096 dynamically linked executable
20818 >>20 lelong >4096 dynamically linked executable
20819 >0 byte ^0x80 executable
20822 >0 byte &0x80 dynamically linked executable
20823 >0 byte ^0x80 executable
20826 >0 byte &0x80 dynamically linked executable
20829 >>20 lelong !0 executable
20842 >>20 belong =8192 dynamically linked executable
20843 >>20 belong >8192 dynamically linked executable
20844 >0 byte ^0x80 executable
20847 >0 byte &0x80 dynamically linked executable
20848 >0 byte ^0x80 executable
20851 >0 byte &0x80 dynamically linked executable
20854 >>20 belong !0 executable
20864 >>20 lelong =4096 dynamically linked executable
20865 >>20 lelong >4096 dynamically linked executable
20866 >0 byte ^0x80 executable
20869 >0 byte &0x80 dynamically linked executable
20870 >0 byte ^0x80 executable
20873 >0 byte &0x80 dynamically linked executable
20876 >>20 lelong !0 executable
20886 >>20 lelong =4096 dynamically linked executable
20887 >>20 lelong >4096 dynamically linked executable
20888 >0 byte ^0x80 executable
20891 >0 byte &0x80 dynamically linked executable
20892 >0 byte ^0x80 executable
20895 >0 byte &0x80 dynamically linked executable
20898 >>20 lelong !0 executable
20908 >>20 lelong =4096 dynamically linked executable
20909 >>20 lelong >4096 dynamically linked executable
20910 >0 byte ^0x80 executable
20913 >0 byte &0x80 dynamically linked executable
20914 >0 byte ^0x80 executable
20917 >0 byte &0x80 dynamically linked executable
20920 >>20 lelong !0 executable
20940 >>20 belong =8192 dynamically linked executable
20941 >>20 belong >8192 dynamically linked executable
20942 >0 byte ^0x80 executable
20945 >0 byte &0x80 dynamically linked executable
20946 >0 byte ^0x80 executable
20949 >0 byte &0x80 dynamically linked executable
20952 >>20 belong !0 executable
20962 >>20 lelong =4096 dynamically linked executable
20963 >>20 lelong >4096 dynamically linked executable
20964 >0 byte ^0x80 executable
20967 >0 byte &0x80 dynamically linked executable
20968 >0 byte ^0x80 executable
20971 >0 byte &0x80 dynamically linked executable
20974 >>20 lelong !0 executable
21201 >>16 leshort 2 executable,
21234 >>16 beshort 2 executable,
21385 >6 byte&0x0f 0x00 non-executable
21393 >6 byte&0xf0 0x10 program executable
21424 >0x12 byte 1 program executable
21608 >19 byte&0x02 0x02 executable
21797 # pdp: file(1) magic for PDP-11 executable/object and APL workspace
21804 0 leshort 0407 PDP-11 executable
21817 0 leshort 0410 PDP-11 pure executable
21821 0 leshort 0411 PDP-11 separate I&D executable
21828 0 leshort 0413 PDP-11 demand-paged pure executable
21831 0 leshort 0430 PDP-11 overlaid pure executable
21834 0 leshort 0431 PDP-11 overlaid separate executable
21861 0 string #!/usr/bin/env\ perl Perl script text executable
21863 0 string #!\ /usr/bin/env\ perl Perl script text executable
21866 >0 regex \^#!.*/bin/perl([[:space:]].*)*$ Perl script text executable
22562 0 belong 0x00000107 Plan 9 executable, Motorola 68k
22563 0 belong 0x000001EB Plan 9 executable, Intel 386
22564 0 belong 0x00000247 Plan 9 executable, Intel 960
22565 0 belong 0x000002AB Plan 9 executable, SPARC
22566 0 belong 0x00000407 Plan 9 executable, MIPS R3000
22567 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210
22568 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE
22569 0 belong 0x000005AB Plan 9 executable, AMD 29000
22570 0 belong 0x00000647 Plan 9 executable, ARM 7-something
22571 0 belong 0x000006EB Plan 9 executable, PowerPC
22572 0 belong 0x00000797 Plan 9 executable, MIPS R4000 LE
22573 0 belong 0x0000084B Plan 9 executable, DEC Alpha
22837 0 long 0x50900107 Pyramid 90x family executable
22838 0 long 0x50900108 Pyramid 90x family pure executable
22840 0 long 0x5090010b Pyramid 90x family demand paged pure executable
22850 0 string/t """ Python script text executable
22874 0 search/1/w #!\ /usr/bin/python Python script text executable
22877 0 search/1/w #!\ /usr/local/bin/python Python script text executable
22880 0 search/1 #!/usr/bin/env\ python Python script text executable
22883 0 search/10 #!\ /usr/bin/env\ python Python script text executable
22889 …gex \^from[\040\t\f\r\n]+([A-Za-z0-9_]|\\.)+[\040\t\f\r\n]+import.*$ Python script text executable
22895 >&0 search/64 self Python script text executable
22901 >&0 search/64 '__main__' Python script text executable
22902 >&0 search/64 "__main__" Python script text executable
22907 0 regex/4096 \^import\ [_[:alpha:]]+\ as\ [[:alpha:]][[:space:]]*$ Python script text executable
22912 #>&0 regex .*'''$ Python script text executable
22916 #>&0 regex .*"""$ Python script text executable
22923 >&0 regex/4096 \^[[:space:]]*except.*:$ Python script text executable
22926 >&0 search/4096 finally: Python script text executable
22930 0 regex \^class\ [_[:alpha:]]+(\\(.*\\))?(\ )*:([\ \t]+pass)?$ Python script text executable
22936 >&0 regex \\(([[:alpha:]*_,\ ]){0,255}\\):$ Python script text executable
23441 0 search/1/w #!\ /usr/bin/ruby Ruby script text executable
23444 0 search/1/w #!\ /usr/local/bin/ruby Ruby script text executable
23447 0 search/1 #!/usr/bin/env\ ruby Ruby script text executable
23450 0 search/1 #!\ /usr/bin/env\ ruby Ruby script text executable
23703 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0)
23706 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0)
23709 0 lelong 0x30ea BALANCE NS32000 standalone executable
23719 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0)
23722 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0)
23727 #0 leshort 0x42eb SYMMETRY i386 standalone executable
23732 >>124 lelong !28867614 SYMMETRY i386 standalone executable
24099 0 string NqNqNq`\004 QL firmware executable (BCPL)
24106 4 belong 0x4AFB QDOS executable
24793 >>20 belong =4096 dynamically linked executable
24794 >>20 belong >4096 dynamically linked executable
24795 >0 byte ^0x80 executable
24799 >0 byte &0x80 dynamically linked executable
24800 >0 byte ^0x80 executable
24804 >0 byte &0x80 dynamically linked executable
24805 >0 byte ^0x80 executable
24811 >>20 belong =4096 dynamically linked executable
24812 >>20 belong >4096 dynamically linked executable
24813 >0 byte ^0x80 executable
24817 >0 byte &0x80 dynamically linked executable
24818 >0 byte ^0x80 executable
24822 >0 byte &0x80 dynamically linked executable
24823 >0 byte ^0x80 executable
24829 >>20 belong =4096 dynamically linked executable
24830 >>20 belong >4096 dynamically linked executable
24831 >0 byte ^0x80 executable
24835 >0 byte &0x80 dynamically linked executable
24836 >0 byte ^0x80 executable
24840 >0 byte &0x80 dynamically linked executable
24841 >0 byte ^0x80 executable
24927 0x30 string SymExe SymbOS executable
25288 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable
25290 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable
25292 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable
25294 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable
25296 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable
25298 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable
25300 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable
25302 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
25954 # (executable, pure, and split I&D, respectively), but the PDP-11 version
25967 #0 short 0x107 unknown machine executable
25970 #0 short 0x108 unknown pure executable
25976 #0 short 0x10b unknown pure executable
25979 0 long 0x10c unknown demand paged pure executable
25981 0 long 0x10e unknown readable demand paged pure executable
26092 0 short 0610 Perkin-Elmer executable
26094 0 beshort 0572 amd 29k coff noprebar executable
26095 0 beshort 01572 amd 29k coff prebar executable
26098 6 beshort 0407 unicos (cray) executable
26104 0 string Joy!peffpwpc header for PowerPC PEF executable
26121 # 0 string exec BugOS executable
26134 >3 string >\0 %s script text executable
26137 >3 string >\0 %s script executable (binary data)
26140 >3 string >\0 %s script text executable
26143 >3 string >\0 %s script executable (binary data)
26146 >2 string >\0 %s script text executable
26149 >2 string >\0 %s script executable (binary data)
26151 0 string/t #!\ script text executable
26154 0 string/b #!\ script executable
26159 >15 string/t >\0 %s script text executable
26163 >15 string/b >\0 %s script executable (binary data)
26167 >16 string/t >\0 %s script text executable
26171 >16 string/b >\0 %s script executable (binary data)
26183 # vax: file(1) magic for VAX executable/object and APL workspace
26192 0 lelong 0420 a.out VAX demand paged (first page unmapped) pure executable
26201 0 leshort 0570 VAX COFF executable
26204 0 leshort 0575 VAX COFF pure executable
26405 0 string \xb0\0\x30\0 VMS VAX executable
26419 >8 ubelong 0xec020000 VMS Alpha executable
26654 # For format usable in DOS, such as generic executable
27749 >0x1e leshort &0x1 executable
27759 >0 byte &0x1 executable
27769 >0x1e leshort &0x1 executable
27840 >6 leshort&0x1000 =0x0000 executable,