Lines Matching refs:executable

12 # text if readable, executable if runnable binary, data if unreadable.
27 16 lelong 0xef000011 RISC OS AIF executable
89 >18 lelong &02 executable,
256 0 short 0420 0420 Alliant virtual executable
259 0 short 0421 0421 Alliant compact executable
283 0 belong 0x000003f3 AmigaOS loadseg()ble executable/binary
1517 # aout: file(1) magic for a.out executable/object/etc entries that
1531 0 lelong 0407 a.out little-endian 32-bit executable
1535 0 lelong 0410 a.out little-endian 32-bit pure executable
1539 0 lelong 0413 a.out little-endian 32-bit demand paged pure executable
1551 0 belong 0407 a.out big-endian 32-bit executable
1554 0 belong 0410 a.out big-endian 32-bit pure executable
1557 0 belong 0413 a.out big-endian 32-bit demand paged executable
1783 # Note there might be some problems with the "VAX COFF executable"
1871 0 belong 0xfade0cc0 Mac OS X Detached Code Signature (non-executable)
2463 # BatComp left out: sig looks like COM executable
3067 5 string -pc1- PopCom compressed executable (CP/M)
3335 #0 beshort 0550 3b20 COFF executable
3338 #0 beshort 0551 3b20 COFF executable (TV)
3346 >18 beshort &00000020 executable
3356 0 beshort 0561 WE32000 COFF executable (TV)
4267 0 string bFLT BFLT executable
4535 #0 long 0407 68K Blit (standalone) executable
4536 #0 short 0407 VAX-order2 68K Blit (standalone) executable
4537 0 short 03401 VAX-order 68K Blit (standalone) executable
4538 0 long 0406 68k Blit mpx/mux executable
4539 0 short 0406 VAX-order2 68k Blit mpx/mux executable
4540 0 short 03001 VAX-order 68k Blit mpx/mux executable
4543 #0 short 0520 tty630 layers executable
4559 # Some object/executable formats use the same magic numbers as are used
4563 0 lelong 0314 386 compact demand paged pure executable
4571 >>20 belong =4096 dynamically linked executable
4572 >>20 belong >4096 dynamically linked executable
4573 >0 byte ^0x80 executable
4578 >0 byte &0x80 dynamically linked executable
4579 >0 byte ^0x80 executable
4584 >0 byte &0x80 dynamically linked executable
4585 >0 byte ^0x80 executable
5125 0 short 0575 CLIPPER COFF executable (VAX #)
5133 0 short 0577 CLIPPER COFF executable
5180 # DJGPP, 80386 COFF executable, MS Windows COFF Intel 80386 object file (./intel)
5186 # executable (RISC System/6000 V3.1) or obj module (./ibm6000)
5197 >>18 leshort &0x0002 executable
5243 0 string/wt #!\ /bin/sh POSIX shell script text executable
5245 0 string/wb #!\ /bin/sh POSIX shell script executable (binary data)
5248 0 string/wt #!\ /bin/csh C shell script text executable
5252 0 string/wt #!\ /bin/ksh Korn shell script text executable
5254 0 string/wb #!\ /bin/ksh Korn shell script executable (binary data)
5257 0 string/wt #!\ /bin/tcsh Tenex C shell script text executable
5259 0 string/wt #!\ /usr/bin/tcsh Tenex C shell script text executable
5261 0 string/wt #!\ /usr/local/tcsh Tenex C shell script text executable
5263 0 string/wt #!\ /usr/local/bin/tcsh Tenex C shell script text executable
5268 0 string/wt #!\ /bin/zsh Paul Falstad's zsh script text executable
5270 0 string/wt #!\ /usr/bin/zsh Paul Falstad's zsh script text executable
5272 0 string/wt #!\ /usr/local/bin/zsh Paul Falstad's zsh script text executable
5274 0 string/wt #!\ /usr/local/bin/ash Neil Brown's ash script text executable
5276 0 string/wt #!\ /usr/local/bin/ae Neil Brown's ae script text executable
5278 0 string/wt #!\ /bin/nawk new awk script text executable
5280 0 string/wt #!\ /usr/bin/nawk new awk script text executable
5282 0 string/wt #!\ /usr/local/bin/nawk new awk script text executable
5284 0 string/wt #!\ /bin/gawk GNU awk script text executable
5286 0 string/wt #!\ /usr/bin/gawk GNU awk script text executable
5288 0 string/wt #!\ /usr/local/bin/gawk GNU awk script text executable
5291 0 string/wt #!\ /bin/awk awk script text executable
5293 0 string/wt #!\ /usr/bin/awk awk script text executable
5298 0 string/wt #!\ /bin/rc Plan 9 rc shell script text executable
5301 0 string/wt #!\ /bin/bash Bourne-Again shell script text executable
5303 0 string/wb #!\ /bin/bash Bourne-Again shell script executable (binary data)
5305 0 string/wt #!\ /usr/bin/bash Bourne-Again shell script text executable
5307 0 string/wb #!\ /usr/bin/bash Bourne-Again shell script executable (binary data)
5309 0 string/wt #!\ /usr/local/bash Bourne-Again shell script text executable
5311 0 string/wb #!\ /usr/local/bash Bourne-Again shell script executable (binary data)
5313 0 string/wt #!\ /usr/local/bin/bash Bourne-Again shell script text executable
5315 0 string/wb #!\ /usr/local/bin/bash Bourne-Again shell script executable (binary data)
5317 0 string/wt #!\ /usr/bin/env\ bash Bourne-Again shell script text executable
5329 0 search/1/w #!\ /usr/local/bin/php PHP script text executable
5332 0 search/1/w #!\ /usr/bin/php PHP script text executable
6135 0 string PS-X\ EXE Sony Playstation executable
6152 0 string CPE CPE executable
6157 0 string XBEH XBE, Microsoft Xbox executable
6546 0 belong 0513 Convex old-style demand paged executable
6548 0 belong 0515 Convex old-style pre-paged executable
6550 0 belong 0517 Convex old-style pre-paged, non-swapped executable
6582 >84 belong &0x80000000 executable
7625 >>22 leshort&030000 !020000 executable
8007 >16 leshort 2 executable,
8008 !:mime application/x-executable
8291 >20 short 0x107 executable
8292 >20 short 0x108 pure executable
8293 >20 short 0x10b demand-paged executable
8294 >20 short 0x10f unsupported executable
8299 0 short 0x155 Encore unsupported executable
8365 0 lelong 0x1000007A Psion Series 5 executable
11192 # schemes for distinguishing between executable images, shared libraries,
11206 # an executable, and is dynamically-linked if the "has run-time
11214 # a dynamically-linked executable;
11221 # if the entry point is non-zero, it's an executable, otherwise
11227 # a dynamically-linked executable, otherwise it's just an
11228 # executable.
11238 # it's a dynamically-linked executable);
11241 # set, then it's just an executable.
11264 >>3 byte&0x80 0x80 dynamically linked executable
11265 >>3 byte&0x80 0x00 executable
11274 >>3 byte&0x80 0x80 dynamically linked executable
11275 >>3 byte&0x80 0x00 executable
11284 >>3 byte&0x80 0x80 dynamically linked executable
11285 >>3 byte&0x80 0x00 executable
11294 >>3 byte&0x80 0x80 dynamically linked executable
11295 >>3 byte&0x80 0x00 executable
11809 >40 byte 1 executable
12456 0 beshort 0627 Apollo m68k COFF executable
12459 0 beshort 0624 apollo a88k COFF executable
12468 0 belong 0x02100107 PA-RISC1.1 executable
12473 0 belong 0x02100108 PA-RISC1.1 shared executable
12478 0 belong 0x0210010b PA-RISC1.1 demand-load executable
12492 0 belong 0x02140107 PA-RISC2.0 executable
12497 0 belong 0x02140108 PA-RISC2.0 shared executable
12502 0 belong 0x0214010b PA-RISC2.0 demand-load executable
12516 0 belong 0x020b0107 PA-RISC1.0 executable
12521 0 belong 0x020b0108 PA-RISC1.0 shared executable
12526 0 belong 0x020b010b PA-RISC1.0 demand-load executable
12544 0 long 0x02080106 HP s500 relocatable executable
12547 0 long 0x02080107 HP s500 executable
12550 0 long 0x02080108 HP s500 pure executable
12554 0 belong 0x020c0108 HP s200 pure executable
12561 0 belong 0x020c0107 HP s200 executable
12568 0 belong 0x020c010b HP s200 demand-load executable
12575 0 belong 0x020c0106 HP s200 relocatable executable
12582 0 belong 0x020a0108 HP s200 (2.x release) pure executable
12586 0 belong 0x020a0107 HP s200 (2.x release) executable
12866 #>0 string HU X executable
12871 #0 beshort 0x601a Human68k Z executable
12878 #>4 string LZX R executable
12879 #2 string #HUPAIR Human68k hupair R executable
12885 # "ibm370" said that 0x15d == 0535 was "ibm 370 pure executable".
12889 # 0 short 0535 370 sysV executable
12893 # 0 short 0530 370 sysV pure executable
12900 0 beshort 0537 370 XA sysV executable
12904 0 beshort 0532 370 XA sysV pure executable
12908 0 beshort 054001 370 sysV pure executable
12910 0 beshort 055001 370 XA sysV pure executable
12912 0 beshort 056401 370 sysV executable
12914 0 beshort 057401 370 XA sysV executable
12916 0 beshort 0531 SVR2 executable (Amdahl-UTS)
12919 0 beshort 0534 SVR2 pure executable (Amdahl-UTS)
12922 0 beshort 0530 SVR2 pure executable (USS/370)
12925 0 beshort 0535 SVR2 executable (USS/370)
12933 0 beshort 0x01df executable (RISC System/6000 V3.1) or obj module
12936 #0 beshort 0x0103 executable (RT Version 2) or obj module
12948 0 beshort 0x01f7 64-bit XCOFF executable or object module
13243 >>24 string Exec with executable chunk
14730 # Various flavors of x86 UNIX executable/object (other than Xenix, which
14741 0 leshort 0502 basic-16 executable
14744 0 leshort 0503 basic-16 executable (TV)
14747 0 leshort 0510 x86 executable
14749 0 leshort 0511 x86 executable (TV)
14751 0 leshort =0512 iAPX 286 executable small model (COFF)
14754 0 leshort =0522 iAPX 286 executable large model (COFF)
14761 # ./intel (version 5.25) label labeled the next entry as "80386 COFF executable"
14762 # SGI labeled the next entry as "iAPX 386 executable" --Dan Quinlan
14919 0 search/1/w #!/bin/node Node.js script text executable
14921 0 search/1/w #!/usr/bin/node Node.js script text executable
14923 0 search/1/w #!/bin/nodejs Node.js script text executable
14925 0 search/1/w #!/usr/bin/nodejs Node.js script text executable
14927 0 search/1 #!/usr/bin/env\ node Node.js script text executable
14929 0 search/1 #!/usr/bin/env\ nodejs Node.js script text executable
15212 # >0 leshort 0407 impure executable (OMAGIC)
15213 # >0 leshort 0410 pure executable (NMAGIC)
15214 # >0 leshort 0413 demand-paged executable (ZMAGIC)
15215 # >0 leshort 0314 demand-paged executable (QMAGIC)
15217 0 lelong 0x00640107 Linux/i386 impure executable (OMAGIC)
15219 0 lelong 0x00640108 Linux/i386 pure executable (NMAGIC)
15221 0 lelong 0x0064010b Linux/i386 demand-paged executable (ZMAGIC)
15223 0 lelong 0x006400cc Linux/i386 demand-paged executable (QMAGIC)
15229 0 string \01\03\020\04 Linux-8086 impure executable
15231 0 string \01\03\040\04 Linux-8086 executable
15236 0 string \01\03\020\20 Minix-386 impure executable
15238 0 string \01\03\040\20 Minix-386 executable
15240 0 string \01\03\04\20 Minix-386 NSYM/GNU executable
15249 # this can be overridden by the DOS executable (COM) entry
15307 >510 leshort 0xAA55 x86 boot executable
15397 36 lelong 0x016f2818 Linux kernel ARM boot executable zImage (little-endian)
15398 36 belong 0x016f2818 Linux kernel ARM boot executable zImage (big-endian)
15401 # Linux 8086 executable
15402 0 lelong&0xFF0000FF 0xC30000E9 Linux-Dev86 executable, headerless
15406 0 lelong&0xFF00FFFF 0x4000301 Linux-8086 executable
15420 # 0 lelong&0xFF00FFFF 0x10000301 ld86 I80386 executable
15421 # 0 lelong&0xFF00FFFF 0xB000301 ld86 M68K executable
15422 # 0 lelong&0xFF00FFFF 0xC000301 ld86 NS16K executable
15423 # 0 lelong&0xFF00FFFF 0x17000301 ld86 SPARC executable
15784 0 search/1/w #!\ /usr/bin/lua Lua script text executable
15786 0 search/1/w #!\ /usr/local/bin/lua Lua script text executable
15788 0 search/1 #!/usr/bin/env\ lua Lua script text executable
15790 0 search/1 #!\ /usr/bin/env\ lua Lua script text executable
16017 >12 belong 2 executable
16020 >12 belong 5 preload executable
16940 0 beshort 0x0160 MIPSEB ECOFF executable
16949 0 beshort 0x0162 MIPSEL-BE ECOFF executable
16958 0 beshort 0x6001 MIPSEB-LE ECOFF executable
16967 0 beshort 0x6201 MIPSEL ECOFF executable
16978 0 beshort 0x0163 MIPSEB MIPS-II ECOFF executable
16987 0 beshort 0x0166 MIPSEL-BE MIPS-II ECOFF executable
16996 0 beshort 0x6301 MIPSEB-LE MIPS-II ECOFF executable
17005 0 beshort 0x6601 MIPSEL MIPS-II ECOFF executable
17016 0 beshort 0x0140 MIPSEB MIPS-III ECOFF executable
17025 0 beshort 0x0142 MIPSEL-BE MIPS-III ECOFF executable
17034 0 beshort 0x4001 MIPSEB-LE MIPS-III ECOFF executable
17043 0 beshort 0x4201 MIPSEL MIPS-III ECOFF executable
17061 0 long 31415 Mirage Assembler m.out executable
17247 >18 beshort &00000020 executable
17254 0 beshort 0521 mc68k executable (shared)
17256 0 beshort 0522 mc68k executable (shared demand paged)
17261 0 beshort 0554 68K BCS executable
17267 0 beshort 0555 88K BCS executable
17279 0 belong&0xFFFFFFF0 0x601A0000 Atari ST M68K contiguous executable
17284 0 belong&0xFFFFFFF0 0x601B0000 Atari ST M68K non-contig executable
17291 0 beshort 0x601A Atari 68xxx executable,
17348 # ./intel already labeled COFF type 0x14c=0514 as "80386 COFF executable"
17368 >0x18 leshort <0x40 MS-DOS executable
17382 >>>(0x3c.l+24) leshort 0x010b \b32 executable
17383 >>>(0x3c.l+24) leshort 0x020b \b32+ executable
17430 # executable inside (which just prints a message and exits if run in win)
17459 >>(0x3c.l) string !PE\0\0 MS-DOS executable
17499 >>(0x3c.l) string LE\0\0 \b, LE executable
17528 # header data too small for extended executable
17539 # calculations (next embedded executable would be at &(&2*512+&0-2)
17560 # By now an executable type should have been printed out. The executable
17653 0 name msdos-driver DOS executable (
17748 >>>4 ubyte >13 DOS executable (COM, 0x8C-variant)
17762 0 ulelong 0xffff10eb DR-DOS executable (COM)
17768 >0 byte x DOS executable (COM)
17803 # syslinux COM32 or COM32R executable
17804 >>1 lelong&0xFFFFFFFe 0x21CD4CFe COM executable (32-bit COMBOOT
17818 # "COM executable (COM32R)" or "Syslinux COM32 module" by TrID
17826 >>1 default x COM executable for DOS
17828 #!:mime application/x-ms-dos-executable
17834 >>36 string UPX! FREE-DOS executable (COM), UPX compressed
17835 252 string Must\ have\ DOS\ version DR-DOS executable (COM)
17838 #34 search/2 UPX! FREE-DOS executable (COM), UPX compressed
17839 34 string UPX! FREE-DOS executable (COM), UPX compressed
17840 35 string UPX! FREE-DOS executable (COM), UPX compressed
17842 #2 search/28 \xcd\x21 COM executable for MS-DOS
17844 2 string \xcd\x21 COM executable for DOS
17846 4 string \xcd\x21 COM executable for DOS
17848 5 string \xcd\x21 COM executable for DOS
17851 >0 byte !0xb8 COM executable for DOS
17854 >5 string !\xcd\x21 COM executable for DOS
17856 13 string \xcd\x21 COM executable for DOS
17858 18 string \xcd\x21 COM executable for MS-DOS
17860 23 string \xcd\x21 COM executable for MS-DOS
17862 30 string \xcd\x21 COM executable for MS-DOS
17864 70 string \xcd\x21 COM executable for DOS
17866 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
17867 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for DOS
17869 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
17873 0 string/b LZ MS-DOS executable (built-in)
19013 >20 beshort 0407 executable
19014 >20 beshort 0410 pure executable
19018 >20 beshort 0407 executable
19019 >20 beshort 0410 pure executable
19023 >20 beshort 0407 executable
19024 >20 beshort 0410 pure executable
19028 >20 beshort 0407 executable
19029 >20 beshort 0410 pure executable
19033 >20 beshort 0407 executable
19034 >20 beshort 0410 pure executable
19040 >20 beshort 0407 executable
19041 >20 beshort 0413 pure executable
19047 >20 beshort 0407 executable
19048 >20 beshort 0413 pure executable
19077 >>20 lelong =4096 dynamically linked executable
19078 >>20 lelong >4096 dynamically linked executable
19079 >0 byte ^0x80 executable
19082 >0 byte &0x80 dynamically linked executable
19083 >0 byte ^0x80 executable
19086 >0 byte &0x80 dynamically linked executable
19089 >>20 lelong !0 executable
19099 >>20 belong =8192 dynamically linked executable
19100 >>20 belong >8192 dynamically linked executable
19101 >0 byte ^0x80 executable
19104 >0 byte &0x80 dynamically linked executable
19105 >0 byte ^0x80 executable
19108 >0 byte &0x80 dynamically linked executable
19111 >>20 belong !0 executable
19121 >>20 belong =4096 dynamically linked executable
19122 >>20 belong >4096 dynamically linked executable
19123 >0 byte ^0x80 executable
19126 >0 byte &0x80 dynamically linked executable
19127 >0 byte ^0x80 executable
19130 >0 byte &0x80 dynamically linked executable
19133 >>20 belong !0 executable
19143 >>20 lelong =4096 dynamically linked executable
19144 >>20 lelong >4096 dynamically linked executable
19145 >0 byte ^0x80 executable
19148 >0 byte &0x80 dynamically linked executable
19149 >0 byte ^0x80 executable
19152 >0 byte &0x80 dynamically linked executable
19155 >>20 lelong !0 executable
19168 >>20 belong =8192 dynamically linked executable
19169 >>20 belong >8192 dynamically linked executable
19170 >0 byte ^0x80 executable
19173 >0 byte &0x80 dynamically linked executable
19174 >0 byte ^0x80 executable
19177 >0 byte &0x80 dynamically linked executable
19180 >>20 belong !0 executable
19190 >>20 lelong =4096 dynamically linked executable
19191 >>20 lelong >4096 dynamically linked executable
19192 >0 byte ^0x80 executable
19195 >0 byte &0x80 dynamically linked executable
19196 >0 byte ^0x80 executable
19199 >0 byte &0x80 dynamically linked executable
19202 >>20 lelong !0 executable
19212 >>20 lelong =4096 dynamically linked executable
19213 >>20 lelong >4096 dynamically linked executable
19214 >0 byte ^0x80 executable
19217 >0 byte &0x80 dynamically linked executable
19218 >0 byte ^0x80 executable
19221 >0 byte &0x80 dynamically linked executable
19224 >>20 lelong !0 executable
19234 >>20 lelong =4096 dynamically linked executable
19235 >>20 lelong >4096 dynamically linked executable
19236 >0 byte ^0x80 executable
19239 >0 byte &0x80 dynamically linked executable
19240 >0 byte ^0x80 executable
19243 >0 byte &0x80 dynamically linked executable
19246 >>20 lelong !0 executable
19266 >>20 belong =8192 dynamically linked executable
19267 >>20 belong >8192 dynamically linked executable
19268 >0 byte ^0x80 executable
19271 >0 byte &0x80 dynamically linked executable
19272 >0 byte ^0x80 executable
19275 >0 byte &0x80 dynamically linked executable
19278 >>20 belong !0 executable
19288 >>20 lelong =4096 dynamically linked executable
19289 >>20 lelong >4096 dynamically linked executable
19290 >0 byte ^0x80 executable
19293 >0 byte &0x80 dynamically linked executable
19294 >0 byte ^0x80 executable
19297 >0 byte &0x80 dynamically linked executable
19300 >>20 lelong !0 executable
19508 >>16 leshort 2 executable,
19541 >>16 beshort 2 executable,
19692 >6 byte&0x0f 0x00 non-executable
19700 >6 byte&0xf0 0x10 program executable
19731 >0x12 byte 1 program executable
19915 >19 byte&0x02 0x02 executable
20095 # pdp: file(1) magic for PDP-11 executable/object and APL workspace
20102 0 leshort 0407 PDP-11 executable
20115 0 leshort 0410 PDP-11 pure executable
20119 0 leshort 0411 PDP-11 separate I&D executable
20126 0 leshort 0413 PDP-11 demand-paged pure executable
20129 0 leshort 0430 PDP-11 overlaid pure executable
20132 0 leshort 0431 PDP-11 overlaid separate executable
20159 0 string #!/usr/bin/env\ perl Perl script text executable
20161 0 string #!\ /usr/bin/env\ perl Perl script text executable
20164 >0 regex \^#!.*/bin/perl([[:space:]].*)*$ Perl script text executable
20821 0 belong 0x00000107 Plan 9 executable, Motorola 68k
20822 0 belong 0x000001EB Plan 9 executable, Intel 386
20823 0 belong 0x00000247 Plan 9 executable, Intel 960
20824 0 belong 0x000002AB Plan 9 executable, SPARC
20825 0 belong 0x00000407 Plan 9 executable, MIPS R3000
20826 0 belong 0x0000048B Plan 9 executable, AT&T DSP 3210
20827 0 belong 0x00000517 Plan 9 executable, MIPS R4000 BE
20828 0 belong 0x000005AB Plan 9 executable, AMD 29000
20829 0 belong 0x00000647 Plan 9 executable, ARM 7-something
20830 0 belong 0x000006EB Plan 9 executable, PowerPC
20831 0 belong 0x00000797 Plan 9 executable, MIPS R4000 LE
20832 0 belong 0x0000084B Plan 9 executable, DEC Alpha
21096 0 long 0x50900107 Pyramid 90x family executable
21097 0 long 0x50900108 Pyramid 90x family pure executable
21099 0 long 0x5090010b Pyramid 90x family demand paged pure executable
21109 0 string/t """ Python script text executable
21129 0 search/1/w #!\ /usr/bin/python Python script text executable
21132 0 search/1/w #!\ /usr/local/bin/python Python script text executable
21135 0 search/1 #!/usr/bin/env\ python Python script text executable
21138 0 search/10 #!\ /usr/bin/env\ python Python script text executable
21144 …gex \^from[\040\t\f\r\n]+([A-Za-z0-9_]|\\.)+[\040\t\f\r\n]+import.*$ Python script text executable
21150 >&0 search/64 self Python script text executable
21156 #>&0 regex .*'''$ Python script text executable
21160 #>&0 regex .*"""$ Python script text executable
21167 >&0 regex \^[\040\t\f\r\n]*except.*: Python script text executable
21170 >&0 search/4096 finally: Python script text executable
21175 >&0 regex \ {0,50}\\(([a-zA-Z]|,|\ ){1,255}\\):$ Python script text executable
21628 0 search/1/w #!\ /usr/bin/ruby Ruby script text executable
21631 0 search/1/w #!\ /usr/local/bin/ruby Ruby script text executable
21634 0 search/1 #!/usr/bin/env\ ruby Ruby script text executable
21637 0 search/1 #!\ /usr/bin/env\ ruby Ruby script text executable
21871 0 lelong 0x10ea BALANCE NS32000 executable (0 @ 0)
21874 0 lelong 0x20ea BALANCE NS32000 executable (invalid @ 0)
21877 0 lelong 0x30ea BALANCE NS32000 standalone executable
21887 0 leshort 0x22eb SYMMETRY i386 executable (0 @ 0)
21890 0 leshort 0x32eb SYMMETRY i386 executable (invalid @ 0)
21895 #0 leshort 0x42eb SYMMETRY i386 standalone executable
21900 >>124 lelong !28867614 SYMMETRY i386 standalone executable
22257 0 string NqNqNq`\004 QL firmware executable (BCPL)
22264 4 belong 0x4AFB QDOS executable
22925 >>20 belong =4096 dynamically linked executable
22926 >>20 belong >4096 dynamically linked executable
22927 >0 byte ^0x80 executable
22931 >0 byte &0x80 dynamically linked executable
22932 >0 byte ^0x80 executable
22936 >0 byte &0x80 dynamically linked executable
22937 >0 byte ^0x80 executable
22943 >>20 belong =4096 dynamically linked executable
22944 >>20 belong >4096 dynamically linked executable
22945 >0 byte ^0x80 executable
22949 >0 byte &0x80 dynamically linked executable
22950 >0 byte ^0x80 executable
22954 >0 byte &0x80 dynamically linked executable
22955 >0 byte ^0x80 executable
22961 >>20 belong =4096 dynamically linked executable
22962 >>20 belong >4096 dynamically linked executable
22963 >0 byte ^0x80 executable
22967 >0 byte &0x80 dynamically linked executable
22968 >0 byte ^0x80 executable
22972 >0 byte &0x80 dynamically linked executable
22973 >0 byte ^0x80 executable
23059 0x30 string SymExe SymbOS executable
23420 0 search/1/w #!\ /usr/bin/tcl Tcl script text executable
23422 0 search/1/w #!\ /usr/local/bin/tcl Tcl script text executable
23424 0 search/1 #!/usr/bin/env\ tcl Tcl script text executable
23426 0 search/1 #!\ /usr/bin/env\ tcl Tcl script text executable
23428 0 search/1/w #!\ /usr/bin/wish Tcl/Tk script text executable
23430 0 search/1/w #!\ /usr/local/bin/wish Tcl/Tk script text executable
23432 0 search/1 #!/usr/bin/env\ wish Tcl/Tk script text executable
23434 0 search/1 #!\ /usr/bin/env\ wish Tcl/Tk script text executable
23993 # (executable, pure, and split I&D, respectively), but the PDP-11 version
24006 #0 short 0x107 unknown machine executable
24009 #0 short 0x108 unknown pure executable
24015 #0 short 0x10b unknown pure executable
24018 0 long 0x10c unknown demand paged pure executable
24020 0 long 0x10e unknown readable demand paged pure executable
24131 0 short 0610 Perkin-Elmer executable
24133 0 beshort 0572 amd 29k coff noprebar executable
24134 0 beshort 01572 amd 29k coff prebar executable
24137 6 beshort 0407 unicos (cray) executable
24143 0 string Joy!peffpwpc header for PowerPC PEF executable
24160 # 0 string exec BugOS executable
24173 >3 string >\0 %s script text executable
24176 >3 string >\0 %s script executable (binary data)
24179 >3 string >\0 %s script text executable
24182 >3 string >\0 %s script executable (binary data)
24185 >2 string >\0 %s script text executable
24188 >2 string >\0 %s script executable (binary data)
24190 0 string/t #!\ script text executable
24193 0 string/b #!\ script executable
24198 >15 string/t >\0 %s script text executable
24202 >15 string/b >\0 %s script executable (binary data)
24206 >16 string/t >\0 %s script text executable
24210 >16 string/b >\0 %s script executable (binary data)
24222 # vax: file(1) magic for VAX executable/object and APL workspace
24231 0 lelong 0420 a.out VAX demand paged (first page unmapped) pure executable
24240 0 leshort 0570 VAX COFF executable
24243 0 leshort 0575 VAX COFF pure executable
24444 0 string \xb0\0\x30\0 VMS VAX executable
24458 >8 ubelong 0xec020000 VMS Alpha executable
24684 # For format usable in DOS, such as generic executable
25636 >0x1e leshort &0x1 executable
25646 >0 byte &0x1 executable
25656 >0x1e leshort &0x1 executable
25727 >6 leshort&0x1000 =0x0000 executable,