===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
libsystem-command-perl-1.121/t/20-zombie.t-25-my $_is_alive = $win32
libsystem-command-perl-1.121/t/20-zombie.t:26:    ? sub { return `tasklist /FO CSV /NH /fi "PID eq $_[0]" 2>NUL | find /I /N "$_[0]" >NUL` }
libsystem-command-perl-1.121/t/20-zombie.t-27-    : sub { return kill 0, $_[0]; };
##############################################
libsystem-command-perl-1.121/lib/System/Command.pm-151-                # and finally, exec into @cmd
libsystem-command-perl-1.121/lib/System/Command.pm:152:                exec( { $cmd[0] } @cmd )
libsystem-command-perl-1.121/lib/System/Command.pm-153-                    or do { croak "Can't exec( @cmd ): $!"; }
##############################################
libsystem-command-perl-1.121/lib/System/Command/Reaper.pm-38-my $_is_alive = MSWin32
libsystem-command-perl-1.121/lib/System/Command/Reaper.pm:39:    ? sub { return `tasklist /FO CSV /NH /fi "PID eq $_[0]"` =~ /^"/ }
libsystem-command-perl-1.121/lib/System/Command/Reaper.pm-40-    : sub { return kill 0, $_[0]; };