msdos 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716
  1. #------------------------------------------------------------------------------
  2. # $File: msdos,v 1.65 2009/09/19 16:28:11 christos Exp $
  3. # msdos: file(1) magic for MS-DOS files
  4. #
  5. # .BAT files (Daniel Quinlan, quinlan@yggdrasil.com)
  6. # updated by Joerg Jenderek at Oct 2008
  7. 0 string @
  8. >1 string/cW \ echo\ off DOS batch file text
  9. !:mime text/x-msdos-batch
  10. >1 string/cW echo\ off DOS batch file text
  11. !:mime text/x-msdos-batch
  12. >1 string/cW rem\ DOS batch file text
  13. !:mime text/x-msdos-batch
  14. >1 string/cW set\ DOS batch file text
  15. !:mime text/x-msdos-batch
  16. # OS/2 batch files are REXX. the second regex is a bit generic, oh well
  17. # the matched commands seem to be common in REXX and uncommon elsewhere
  18. 100 regex/c =^[\ \t]{0,10}call[\ \t]{1,10}rxfunc OS/2 REXX batch file text
  19. 100 regex/c =^[\ \t]{0,10}say\ ['"] OS/2 REXX batch file text
  20. 0 leshort 0x14c MS Windows COFF Intel 80386 object file
  21. #>4 ledate x stamp %s
  22. 0 leshort 0x166 MS Windows COFF MIPS R4000 object file
  23. #>4 ledate x stamp %s
  24. 0 leshort 0x184 MS Windows COFF Alpha object file
  25. #>4 ledate x stamp %s
  26. 0 leshort 0x268 MS Windows COFF Motorola 68000 object file
  27. #>4 ledate x stamp %s
  28. 0 leshort 0x1f0 MS Windows COFF PowerPC object file
  29. #>4 ledate x stamp %s
  30. 0 leshort 0x290 MS Windows COFF PA-RISC object file
  31. #>4 ledate x stamp %s
  32. # XXX - according to Microsoft's spec, at an offset of 0x3c in a
  33. # PE-format executable is the offset in the file of the PE header;
  34. # unfortunately, that's a little-endian offset, and there's no way
  35. # to specify an indirect offset with a specified byte order.
  36. # So, for now, we assume the standard MS-DOS stub, which puts the
  37. # PE header at 0x80 = 128.
  38. #
  39. # Required OS version and subsystem version were 4.0 on some NT 3.51
  40. # executables built with Visual C++ 4.0, so it's not clear that
  41. # they're interesting. The user version was 0.0, but there's
  42. # probably some linker directive to set it. The linker version was
  43. # 3.0, except for one ".exe" which had it as 4.20 (same damn linker!).
  44. #
  45. # many of the compressed formats were extraced from IDARC 1.23 source code
  46. #
  47. 0 string MZ
  48. !:mime application/x-dosexec
  49. >0x18 leshort <0x40 MS-DOS executable
  50. >0 string MZ\0\0\0\0\0\0\0\0\0\0PE\0\0 \b, PE for MS Windows
  51. >>&18 leshort&0x2000 >0 (DLL)
  52. >>&88 leshort 0 (unknown subsystem)
  53. >>&88 leshort 1 (native)
  54. >>&88 leshort 2 (GUI)
  55. >>&88 leshort 3 (console)
  56. >>&88 leshort 7 (POSIX)
  57. >>&0 leshort 0x0 unknown processor
  58. >>&0 leshort 0x14c Intel 80386
  59. >>&0 leshort 0x166 MIPS R4000
  60. >>&0 leshort 0x184 Alpha
  61. >>&0 leshort 0x268 Motorola 68000
  62. >>&0 leshort 0x1f0 PowerPC
  63. >>&0 leshort 0x290 PA-RISC
  64. >>&18 leshort&0x0100 >0 32-bit
  65. >>&18 leshort&0x1000 >0 system file
  66. >>&0xf4 search/0x140 \x0\x40\x1\x0
  67. >>>(&0.l+(4)) string MSCF \b, WinHKI CAB self-extracting archive
  68. >30 string Copyright\ 1989-1990\ PKWARE\ Inc. Self-extracting PKZIP archive
  69. !:mime application/zip
  70. # Is next line correct? One might expect "Corp." not "Copr." If it is right, add a note to that effect.
  71. >30 string PKLITE\ Copr. Self-extracting PKZIP archive
  72. !:mime application/zip
  73. >0x18 leshort >0x3f
  74. >>(0x3c.l) string PE\0\0 PE
  75. >>>(0x3c.l+25) byte 1 \b32 executable
  76. >>>(0x3c.l+25) byte 2 \b32+ executable
  77. # hooray, there's a DOS extender using the PE format, with a valid PE
  78. # executable inside (which just prints a message and exits if run in win)
  79. >>>(0x3c.l+92) leshort <10
  80. >>>>(8.s*16) string 32STUB for MS-DOS, 32rtm DOS extender
  81. >>>>(8.s*16) string !32STUB for MS Windows
  82. >>>>>(0x3c.l+22) leshort&0x2000 >0 (DLL)
  83. >>>>>(0x3c.l+92) leshort 0 (unknown subsystem)
  84. >>>>>(0x3c.l+92) leshort 1 (native)
  85. >>>>>(0x3c.l+92) leshort 2 (GUI)
  86. >>>>>(0x3c.l+92) leshort 3 (console)
  87. >>>>>(0x3c.l+92) leshort 7 (POSIX)
  88. >>>(0x3c.l+92) leshort 10 (EFI application)
  89. >>>(0x3c.l+92) leshort 11 (EFI boot service driver)
  90. >>>(0x3c.l+92) leshort 12 (EFI runtime driver)
  91. >>>(0x3c.l+92) leshort 13 (XBOX)
  92. >>>(0x3c.l+4) leshort 0x0 unknown processor
  93. >>>(0x3c.l+4) leshort 0x14c Intel 80386
  94. >>>(0x3c.l+4) leshort 0x166 MIPS R4000
  95. >>>(0x3c.l+4) leshort 0x184 Alpha
  96. >>>(0x3c.l+4) leshort 0x268 Motorola 68000
  97. >>>(0x3c.l+4) leshort 0x1f0 PowerPC
  98. >>>(0x3c.l+4) leshort 0x290 PA-RISC
  99. >>>(0x3c.l+4) leshort 0x200 Intel Itanium
  100. >>>(0x3c.l+22) leshort&0x0100 >0 32-bit
  101. >>>(0x3c.l+22) leshort&0x1000 >0 system file
  102. >>>(0x3c.l+232) lelong >0 Mono/.Net assembly
  103. >>>>(0x3c.l+0xf8) string UPX0 \b, UPX compressed
  104. >>>>(0x3c.l+0xf8) search/0x140 PEC2 \b, PECompact2 compressed
  105. >>>>(0x3c.l+0xf8) search/0x140 UPX2
  106. >>>>>(&0x10.l+(-4)) string PK\3\4 \b, ZIP self-extracting archive (Info-Zip)
  107. >>>>(0x3c.l+0xf8) search/0x140 .idata
  108. >>>>>(&0xe.l+(-4)) string PK\3\4 \b, ZIP self-extracting archive (Info-Zip)
  109. >>>>>(&0xe.l+(-4)) string ZZ0 \b, ZZip self-extracting archive
  110. >>>>>(&0xe.l+(-4)) string ZZ1 \b, ZZip self-extracting archive
  111. >>>>(0x3c.l+0xf8) search/0x140 .rsrc
  112. >>>>>(&0x0f.l+(-4)) string a\\\4\5 \b, WinHKI self-extracting archive
  113. >>>>>(&0x0f.l+(-4)) string Rar! \b, RAR self-extracting archive
  114. >>>>>(&0x0f.l+(-4)) search/0x3000 MSCF \b, InstallShield self-extracting archive
  115. >>>>>(&0x0f.l+(-4)) search/32 Nullsoft \b, Nullsoft Installer self-extracting archive
  116. >>>>(0x3c.l+0xf8) search/0x140 .data
  117. >>>>>(&0x0f.l) string WEXTRACT \b, MS CAB-Installer self-extracting archive
  118. >>>>(0x3c.l+0xf8) search/0x140 .petite\0 \b, Petite compressed
  119. >>>>>(0x3c.l+0xf7) byte x
  120. >>>>>>(&0x104.l+(-4)) string =!sfx! \b, ACE self-extracting archive
  121. >>>>(0x3c.l+0xf8) search/0x140 .WISE \b, WISE installer self-extracting archive
  122. >>>>(0x3c.l+0xf8) search/0x140 .dz\0\0\0 \b, Dzip self-extracting archive
  123. >>>>(0x3c.l+0xf8) search/0x140 .reloc
  124. >>>>>(&0xe.l+(-4)) search/0x180 PK\3\4 \b, ZIP self-extracting archive (WinZip)
  125. >>>>&(0x3c.l+0xf8) search/0x100 _winzip_ \b, ZIP self-extracting archive (WinZip)
  126. >>>>&(0x3c.l+0xf8) search/0x100 SharedD \b, Microsoft Installer self-extracting archive
  127. >>>>0x30 string Inno \b, InnoSetup self-extracting archive
  128. >>(0x3c.l) string !PE\0\0 MS-DOS executable
  129. >>(0x3c.l) string NE \b, NE
  130. >>>(0x3c.l+0x36) byte 0 (unknown OS)
  131. >>>(0x3c.l+0x36) byte 1 for OS/2 1.x
  132. >>>(0x3c.l+0x36) byte 2 for MS Windows 3.x
  133. >>>(0x3c.l+0x36) byte 3 for MS-DOS
  134. >>>(0x3c.l+0x36) byte >3 (unknown OS)
  135. >>>(0x3c.l+0x36) byte 0x81 for MS-DOS, Phar Lap DOS extender
  136. >>>(0x3c.l+0x0c) leshort&0x8003 0x8002 (DLL)
  137. >>>(0x3c.l+0x0c) leshort&0x8003 0x8001 (driver)
  138. >>>&(&0x24.s-1) string ARJSFX \b, ARJ self-extracting archive
  139. >>>(0x3c.l+0x70) search/0x80 WinZip(R)\ Self-Extractor \b, ZIP self-extracting archive (WinZip)
  140. >>(0x3c.l) string LX\0\0 \b, LX
  141. >>>(0x3c.l+0x0a) leshort <1 (unknown OS)
  142. >>>(0x3c.l+0x0a) leshort 1 for OS/2
  143. >>>(0x3c.l+0x0a) leshort 2 for MS Windows
  144. >>>(0x3c.l+0x0a) leshort 3 for DOS
  145. >>>(0x3c.l+0x0a) leshort >3 (unknown OS)
  146. >>>(0x3c.l+0x10) lelong&0x28000 =0x8000 (DLL)
  147. >>>(0x3c.l+0x10) lelong&0x20000 >0 (device driver)
  148. >>>(0x3c.l+0x10) lelong&0x300 0x300 (GUI)
  149. >>>(0x3c.l+0x10) lelong&0x28300 <0x300 (console)
  150. >>>(0x3c.l+0x08) leshort 1 i80286
  151. >>>(0x3c.l+0x08) leshort 2 i80386
  152. >>>(0x3c.l+0x08) leshort 3 i80486
  153. >>>(8.s*16) string emx \b, emx
  154. >>>>&1 string x %s
  155. >>>&(&0x54.l-3) string arjsfx \b, ARJ self-extracting archive
  156. # MS Windows system file, supposedly a collection of LE executables
  157. >>(0x3c.l) string W3 \b, W3 for MS Windows
  158. >>(0x3c.l) string LE\0\0 \b, LE executable
  159. >>>(0x3c.l+0x0a) leshort 1
  160. # some DOS extenders use LE files with OS/2 header
  161. >>>>0x240 search/0x100 DOS/4G for MS-DOS, DOS4GW DOS extender
  162. >>>>0x240 search/0x200 WATCOM\ C/C++ for MS-DOS, DOS4GW DOS extender
  163. >>>>0x440 search/0x100 CauseWay\ DOS\ Extender for MS-DOS, CauseWay DOS extender
  164. >>>>0x40 search/0x40 PMODE/W for MS-DOS, PMODE/W DOS extender
  165. >>>>0x40 search/0x40 STUB/32A for MS-DOS, DOS/32A DOS extender (stub)
  166. >>>>0x40 search/0x80 STUB/32C for MS-DOS, DOS/32A DOS extender (configurable stub)
  167. >>>>0x40 search/0x80 DOS/32A for MS-DOS, DOS/32A DOS extender (embedded)
  168. # this is a wild guess; hopefully it is a specific signature
  169. >>>>&0x24 lelong <0x50
  170. >>>>>(&0x4c.l) string \xfc\xb8WATCOM
  171. >>>>>>&0 search/8 3\xdbf\xb9 \b, 32Lite compressed
  172. # another wild guess: if real OS/2 LE executables exist, they probably have higher start EIP
  173. #>>>>(0x3c.l+0x1c) lelong >0x10000 for OS/2
  174. # fails with DOS-Extenders.
  175. >>>(0x3c.l+0x0a) leshort 2 for MS Windows
  176. >>>(0x3c.l+0x0a) leshort 3 for DOS
  177. >>>(0x3c.l+0x0a) leshort 4 for MS Windows (VxD)
  178. >>>(&0x7c.l+0x26) string UPX \b, UPX compressed
  179. >>>&(&0x54.l-3) string UNACE \b, ACE self-extracting archive
  180. # looks like ASCII, probably some embedded copyright message.
  181. # and definitely not NE/LE/LX/PE
  182. >>0x3c lelong >0x20000000
  183. >>>(4.s*512) leshort !0x014c \b, MZ for MS-DOS
  184. # header data too small for extended executable
  185. >2 long !0
  186. >>0x18 leshort <0x40
  187. >>>(4.s*512) leshort !0x014c
  188. >>>>&(2.s-514) string !LE
  189. >>>>>&-2 string !BW \b, MZ for MS-DOS
  190. >>>>&(2.s-514) string LE \b, LE
  191. >>>>>0x240 search/0x100 DOS/4G for MS-DOS, DOS4GW DOS extender
  192. # educated guess since indirection is still not capable enough for complex offset
  193. # calculations (next embedded executable would be at &(&2*512+&0-2)
  194. # I suspect there are only LE executables in these multi-exe files
  195. >>>>&(2.s-514) string BW
  196. >>>>>0x240 search/0x100 DOS/4G ,\b LE for MS-DOS, DOS4GW DOS extender (embedded)
  197. >>>>>0x240 search/0x100 !DOS/4G ,\b BW collection for MS-DOS
  198. # This sequence skips to the first COFF segment, usually .text
  199. >(4.s*512) leshort 0x014c \b, COFF
  200. >>(8.s*16) string go32stub for MS-DOS, DJGPP go32 DOS extender
  201. >>(8.s*16) string emx
  202. >>>&1 string x for DOS, Win or OS/2, emx %s
  203. >>&(&0x42.l-3) byte x
  204. >>>&0x26 string UPX \b, UPX compressed
  205. # and yet another guess: small .text, and after large .data is unusal, could be 32lite
  206. >>&0x2c search/0xa0 .text
  207. >>>&0x0b lelong <0x2000
  208. >>>>&0 lelong >0x6000 \b, 32lite compressed
  209. >(8.s*16) string $WdX \b, WDos/X DOS extender
  210. # .EXE formats (Greg Roelofs, newt@uchicago.edu)
  211. #
  212. >0x35 string \x8e\xc0\xb9\x08\x00\xf3\xa5\x4a\x75\xeb\x8e\xc3\x8e\xd8\x33\xff\xbe\x30\x00\x05 \b, aPack compressed
  213. >0xe7 string LH/2\ Self-Extract \b, %s
  214. >0x1c string diet \b, diet compressed
  215. >0x1c string LZ09 \b, LZEXE v0.90 compressed
  216. >0x1c string LZ91 \b, LZEXE v0.91 compressed
  217. >0x1c string tz \b, TinyProg compressed
  218. >0x1e string PKLITE \b, %s compressed
  219. >0x64 string W\ Collis\0\0 \b, Compack compressed
  220. >0x24 string LHa's\ SFX \b, LHa self-extracting archive
  221. !:mime application/x-lha
  222. >0x24 string LHA's\ SFX \b, LHa self-extracting archive
  223. !:mime application/x-lha
  224. >0x24 string \ $ARX \b, ARX self-extracting archive
  225. >0x24 string \ $LHarc \b, LHarc self-extracting archive
  226. >0x20 string SFX\ by\ LARC \b, LARC self-extracting archive
  227. >1638 string -lh5- \b, LHa self-extracting archive v2.13S
  228. >0x17888 string Rar! \b, RAR self-extracting archive
  229. >0x40 string aPKG \b, aPackage self-extracting archive
  230. >32 string AIN
  231. >>35 string 2 \b, AIN 2.x compressed
  232. >>35 string <2 \b, AIN 1.x compressed
  233. >>35 string >2 \b, AIN 1.x compressed
  234. >28 string UC2X \b, UCEXE compressed
  235. >28 string WWP\ \b, WWPACK compressed
  236. # skip to the end of the exe
  237. >(4.s*512) long x
  238. >>&(2.s-517) byte x
  239. >>>&0 string PK\3\4 \b, ZIP self-extracting archive
  240. >>>&0 string Rar! \b, RAR self-extracting archive
  241. >>>&0 string =!\x11 \b, AIN 2.x self-extracting archive
  242. >>>&0 string =!\x12 \b, AIN 2.x self-extracting archive
  243. >>>&0 string =!\x17 \b, AIN 1.x self-extracting archive
  244. >>>&0 string =!\x18 \b, AIN 1.x self-extracting archive
  245. >>>&7 search/400 **ACE** \b, ACE self-extracting archive
  246. >>>&0 search/0x480 UC2SFX\ Header \b, UC2 self-extracting archive
  247. >0x1c string RJSX \b, ARJ self-extracting archive
  248. # winarj stores a message in the stub instead of the sig in the MZ header
  249. >0x20 search/0xe0 aRJsfX \b, ARJ self-extracting archive
  250. # a few unknown ZIP sfxes, no idea if they are needed or if they are
  251. # already captured by the generic patterns above
  252. >122 string Windows\ self-extracting\ ZIP \b, ZIP self-extracting archive
  253. >(8.s*16) search/0x20 PKSFX \b, ZIP self-extracting archive (PKZIP)
  254. # TODO: how to add this? >FileSize-34 string Windows\ Self-Installing\ Executable \b, ZIP self-extracting archive
  255. #
  256. # TELVOX Teleinformatica CODEC self-extractor for OS/2:
  257. >49801 string \x79\xff\x80\xff\x76\xff \b, CODEC archive v3.21
  258. >>49824 leshort =1 \b, 1 file
  259. >>49824 leshort >1 \b, %u files
  260. # .COM formats (Daniel Quinlan, quinlan@yggdrasil.com)
  261. # Uncommenting only the first two lines will cover about 2/3 of COM files,
  262. # but it isn't feasible to match all COM files since there must be at least
  263. # two dozen different one-byte "magics".
  264. # test too generic ?
  265. 0 byte 0xe9 DOS executable (COM)
  266. >0x1FE leshort 0xAA55 \b, boot code
  267. >6 string SFX\ of\ LHarc (%s)
  268. 0 belong 0xffffffff DOS executable (device driver)
  269. #CMD640X2.SYS
  270. >10 string >\x23
  271. >>10 string !\x2e
  272. >>>17 string <\x5B
  273. >>>>10 string x \b, name: %.8s
  274. #UDMA.SYS KEYB.SYS CMD640X2.SYS
  275. >10 string <\x41
  276. >>12 string >\x40
  277. >>>10 string !$
  278. >>>>12 string x \b, name: %.8s
  279. #BTCDROM.SYS ASPICD.SYS
  280. >22 string >\x40
  281. >>22 string <\x5B
  282. >>>23 string <\x5B
  283. >>>>22 string x \b, name: %.8s
  284. #ATAPICD.SYS
  285. >76 string \0
  286. >>77 string >\x40
  287. >>>77 string <\x5B
  288. >>>>77 string x \b, name: %.8s
  289. # test too generic ?
  290. 0 byte 0x8c DOS executable (COM)
  291. # updated by Joerg Jenderek at Oct 2008
  292. 0 ulelong 0xffff10eb DR-DOS executable (COM)
  293. # byte 0xeb conflicts with "sequent" magic leshort 0xn2eb
  294. 0 ubeshort&0xeb8d >0xeb00
  295. # DR-DOS STACKER.COM SCREATE.SYS missed
  296. >0 byte 0xeb DOS executable (COM)
  297. >>0x1FE leshort 0xAA55 \b, boot code
  298. >>85 string UPX \b, UPX compressed
  299. >>4 string \ $ARX \b, ARX self-extracting archive
  300. >>4 string \ $LHarc \b, LHarc self-extracting archive
  301. >>0x20e string SFX\ by\ LARC \b, LARC self-extracting archive
  302. # updated by Joerg Jenderek at Oct 2008
  303. #0 byte 0xb8 COM executable
  304. 0 uleshort&0x80ff 0x00b8
  305. # modified by Joerg Jenderek
  306. >1 lelong !0x21cd4cff COM executable for DOS
  307. # http://syslinux.zytor.com/comboot.php
  308. # (32-bit COMBOOT) programs *.C32 contain 32-bit code and run in flat-memory 32-bit protected mode
  309. # start with assembler instructions mov eax,21cd4cffh
  310. 0 uleshort&0xc0ff 0xc0b8
  311. >1 lelong 0x21cd4cff COM executable (32-bit COMBOOT)
  312. 0 string \x81\xfc
  313. >4 string \x77\x02\xcd\x20\xb9
  314. >>36 string UPX! FREE-DOS executable (COM), UPX compressed
  315. 252 string Must\ have\ DOS\ version DR-DOS executable (COM)
  316. # added by Joerg Jenderek at Oct 2008
  317. # GRR search is not working
  318. #34 search/2 UPX! FREE-DOS executable (COM), UPX compressed
  319. 34 string UPX! FREE-DOS executable (COM), UPX compressed
  320. 35 string UPX! FREE-DOS executable (COM), UPX compressed
  321. # GRR search is not working
  322. #2 search/28 \xcd\x21 COM executable for MS-DOS
  323. #WHICHFAT.cOM
  324. 2 string \xcd\x21 COM executable for DOS
  325. #DELTREE.cOM DELTREE2.cOM
  326. 4 string \xcd\x21 COM executable for DOS
  327. #IFMEMDSK.cOM ASSIGN.cOM COMP.cOM
  328. 5 string \xcd\x21 COM executable for DOS
  329. #DELTMP.COm HASFAT32.cOM
  330. 7 string \xcd\x21
  331. >0 byte !0xb8 COM executable for DOS
  332. #COMP.cOM MORE.COm
  333. 10 string \xcd\x21
  334. >5 string !\xcd\x21 COM executable for DOS
  335. #comecho.com
  336. 13 string \xcd\x21 COM executable for DOS
  337. #HELP.COm EDIT.coM
  338. 18 string \xcd\x21 COM executable for MS-DOS
  339. #NWRPLTRM.COm
  340. 23 string \xcd\x21 COM executable for MS-DOS
  341. #LOADFIX.cOm LOADFIX.cOm
  342. 30 string \xcd\x21 COM executable for MS-DOS
  343. #syslinux.com 3.11
  344. 70 string \xcd\x21 COM executable for DOS
  345. # many compressed/converted COMs start with a copy loop instead of a jump
  346. 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
  347. 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for DOS
  348. >0x18 search/0x10 \x50\xa4\xff\xd5\x73 \b, aPack compressed
  349. 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
  350. # FIXME: missing diet .com compression
  351. # miscellaneous formats
  352. 0 string LZ MS-DOS executable (built-in)
  353. #0 byte 0xf0 MS-DOS program library data
  354. #
  355. # AAF files:
  356. # <stuartc@rd.bbc.co.uk> Stuart Cunningham
  357. 0 string \320\317\021\340\241\261\032\341AAFB\015\000OM\006\016\053\064\001\001\001\377 AAF legacy file using MS Structured Storage
  358. >30 byte 9 (512B sectors)
  359. >30 byte 12 (4kB sectors)
  360. 0 string \320\317\021\340\241\261\032\341\001\002\001\015\000\002\000\000\006\016\053\064\003\002\001\001 AAF file using MS Structured Storage
  361. >30 byte 9 (512B sectors)
  362. >30 byte 12 (4kB sectors)
  363. # Popular applications
  364. 2080 string Microsoft\ Word\ 6.0\ Document %s
  365. !:mime application/msword
  366. 2080 string Documento\ Microsoft\ Word\ 6 Spanish Microsoft Word 6 document data
  367. !:mime application/msword
  368. # Pawel Wiecek <coven@i17linuxb.ists.pwr.wroc.pl> (for polish Word)
  369. 2112 string MSWordDoc Microsoft Word document data
  370. !:mime application/msword
  371. #
  372. 0 belong 0x31be0000 Microsoft Word Document
  373. !:mime application/msword
  374. #
  375. 0 string PO^Q` Microsoft Word 6.0 Document
  376. !:mime application/msword
  377. #
  378. 0 string \376\067\0\043 Microsoft Office Document
  379. !:mime application/msword
  380. 0 string \333\245-\0\0\0 Microsoft Office Document
  381. !:mime application/msword
  382. 512 string \354\245\301 Microsoft Word Document
  383. !:mime application/msword
  384. #
  385. 2080 string Microsoft\ Excel\ 5.0\ Worksheet %s
  386. !:mime application/vnd.ms-excel
  387. 2080 string Foglio\ di\ lavoro\ Microsoft\ Exce %s
  388. !:mime application/vnd.ms-excel
  389. #
  390. # Pawel Wiecek <coven@i17linuxb.ists.pwr.wroc.pl> (for polish Excel)
  391. 2114 string Biff5 Microsoft Excel 5.0 Worksheet
  392. !:mime application/vnd.ms-excel
  393. # Italian MS-Excel
  394. 2121 string Biff5 Microsoft Excel 5.0 Worksheet
  395. !:mime application/vnd.ms-excel
  396. 0 string \x09\x04\x06\x00\x00\x00\x10\x00 Microsoft Excel Worksheet
  397. !:mime application/vnd.ms-excel
  398. #
  399. 0 belong 0x00001a00 Lotus 1-2-3
  400. !:mime application/x-123
  401. >4 belong 0x00100400 wk3 document data
  402. >4 belong 0x02100400 wk4 document data
  403. >4 belong 0x07800100 fm3 or fmb document data
  404. >4 belong 0x07800000 fm3 or fmb document data
  405. #
  406. 0 belong 0x00000200 Lotus 1-2-3
  407. !:mime application/x-123
  408. >4 belong 0x06040600 wk1 document data
  409. >4 belong 0x06800200 fmt document data
  410. 0 string WordPro\0 Lotus WordPro
  411. !:mime application/vnd.lotus-wordpro
  412. 0 string WordPro\r\373 Lotus WordPro
  413. !:mime application/vnd.lotus-wordpro
  414. # Summary: Script used by InstallScield to uninstall applications
  415. # Extension: .isu
  416. # Submitted by: unknown
  417. # Modified by (1): Abel Cheung <abelcheung@gmail.com> (replace useless entry)
  418. 0 string \x71\xa8\x00\x00\x01\x02
  419. >12 string Stirling\ Technologies, InstallShield Uninstall Script
  420. # Winamp .avs
  421. #0 string Nullsoft\ AVS\ Preset\ \060\056\061\032 A plug in for Winamp ms-windows Freeware media player
  422. 0 string Nullsoft\ AVS\ Preset\ Winamp plug in
  423. # Windows Metafont .WMF
  424. 0 string \327\315\306\232 ms-windows metafont .wmf
  425. 0 string \002\000\011\000 ms-windows metafont .wmf
  426. 0 string \001\000\011\000 ms-windows metafont .wmf
  427. #tz3 files whatever that is (MS Works files)
  428. 0 string \003\001\001\004\070\001\000\000 tz3 ms-works file
  429. 0 string \003\002\001\004\070\001\000\000 tz3 ms-works file
  430. 0 string \003\003\001\004\070\001\000\000 tz3 ms-works file
  431. # PGP sig files .sig
  432. #0 string \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig
  433. 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig
  434. 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig
  435. 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig
  436. 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig
  437. 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig
  438. 0 string \211\000\225\003\005\000\062\122\207\304\100\345\042 PGP sig
  439. # windows zips files .dmf
  440. 0 string MDIF\032\000\010\000\000\000\372\046\100\175\001\000\001\036\001\000 MS Windows special zipped file
  441. #ico files
  442. 0 string \102\101\050\000\000\000\056\000\000\000\000\000\000\000 Icon for MS Windows
  443. # Windows icons (Ian Springer <ips@fpk.hp.com>)
  444. 0 string \000\000\001\000 MS Windows icon resource
  445. !:mime image/x-ico
  446. >4 byte 1 - 1 icon
  447. >4 byte >1 - %d icons
  448. >>6 byte >0 \b, %dx
  449. >>>7 byte >0 \b%d
  450. >>8 byte 0 \b, 256-colors
  451. >>8 byte >0 \b, %d-colors
  452. # .chr files
  453. 0 string PK\010\010BGI Borland font
  454. >4 string >\0 %s
  455. # then there is a copyright notice
  456. # .bgi files
  457. 0 string pk\010\010BGI Borland device
  458. >4 string >\0 %s
  459. # then there is a copyright notice
  460. # Windows Recycle Bin record file (named INFO2)
  461. # By Abel Cheung (abelcheung AT gmail dot com)
  462. # Version 4 always has 280 bytes (0x118) per record, version 5 has 800 bytes
  463. # Since Vista uses another structure, INFO2 structure probably won't change
  464. # anymore. Detailed analysis in:
  465. # http://www.cybersecurityinstitute.biz/downloads/INFO2.pdf
  466. 0 lelong 0x00000004
  467. >12 lelong 0x00000118 Windows Recycle Bin INFO2 file (Win98 or below)
  468. 0 lelong 0x00000005
  469. >12 lelong 0x00000320 Windows Recycle Bin INFO2 file (Win2k - WinXP)
  470. ##### put in Either Magic/font or Magic/news
  471. # Acroread or something files wrongly identified as G3 .pfm
  472. # these have the form \000 \001 any? \002 \000 \000
  473. # or \000 \001 any? \022 \000 \000
  474. #0 string \000\001 pfm?
  475. #>3 string \022\000\000Copyright\ yes
  476. #>3 string \002\000\000Copyright\ yes
  477. #>3 string >\0 oops, not a font file. Cancel that.
  478. #it clashes with ttf files so put it lower down.
  479. # From Doug Lee via a FreeBSD pr
  480. 9 string GERBILDOC First Choice document
  481. 9 string GERBILDB First Choice database
  482. 9 string GERBILCLIP First Choice database
  483. 0 string GERBIL First Choice device file
  484. 9 string RABBITGRAPH RabbitGraph file
  485. 0 string DCU1 Borland Delphi .DCU file
  486. 0 string =!<spell> MKS Spell hash list (old format)
  487. 0 string =!<spell2> MKS Spell hash list
  488. # Too simple - MPi
  489. #0 string AH Halo(TM) bitmapped font file
  490. 0 lelong 0x08086b70 TurboC BGI file
  491. 0 lelong 0x08084b50 TurboC Font file
  492. # WARNING: below line conflicts with Infocom game data Z-machine 3
  493. 0 byte 0x03 DBase 3 data file
  494. >0x04 lelong 0 (no records)
  495. >0x04 lelong >0 (%ld records)
  496. 0 byte 0x83 DBase 3 data file with memo(s)
  497. >0x04 lelong 0 (no records)
  498. >0x04 lelong >0 (%ld records)
  499. 0 leshort 0x0006 DBase 3 index file
  500. 0 string PMCC Windows 3.x .GRP file
  501. 1 string RDC-meg MegaDots
  502. >8 byte >0x2F version %c
  503. >9 byte >0x2F \b.%c file
  504. 0 lelong 0x4C
  505. >4 lelong 0x00021401 Windows shortcut file
  506. # DOS EPS Binary File Header
  507. # From: Ed Sznyter <ews@Black.Market.NET>
  508. 0 belong 0xC5D0D3C6 DOS EPS Binary File
  509. >4 long >0 Postscript starts at byte %d
  510. >>8 long >0 length %d
  511. >>>12 long >0 Metafile starts at byte %d
  512. >>>>16 long >0 length %d
  513. >>>20 long >0 TIFF starts at byte %d
  514. >>>>24 long >0 length %d
  515. # TNEF magic From "Joomy" <joomy@se-ed.net>
  516. # Microsoft Outlook's Transport Neutral Encapsulation Format (TNEF)
  517. 0 leshort 0x223e9f78 TNEF
  518. !:mime application/vnd.ms-tnef
  519. # HtmlHelp files (.chm)
  520. 0 string ITSF\003\000\000\000\x60\000\000\000\001\000\000\000 MS Windows HtmlHelp Data
  521. # GFA-BASIC (Wolfram Kleff)
  522. 2 string GFA-BASIC3 GFA-BASIC 3 data
  523. #------------------------------------------------------------------------------
  524. # From Stuart Caie <kyzer@4u.net> (developer of cabextract)
  525. # Microsoft Cabinet files
  526. 0 string MSCF\0\0\0\0 Microsoft Cabinet archive data
  527. !:mime application/vnd.ms-cab-compressed
  528. >8 lelong x \b, %u bytes
  529. >28 leshort 1 \b, 1 file
  530. >28 leshort >1 \b, %u files
  531. # InstallShield Cabinet files
  532. 0 string ISc( InstallShield Cabinet archive data
  533. >5 byte&0xf0 =0x60 version 6,
  534. >5 byte&0xf0 !0x60 version 4/5,
  535. >(12.l+40) lelong x %u files
  536. # Windows CE package files
  537. 0 string MSCE\0\0\0\0 Microsoft WinCE install header
  538. >20 lelong 0 \b, architecture-independent
  539. >20 lelong 103 \b, Hitachi SH3
  540. >20 lelong 104 \b, Hitachi SH4
  541. >20 lelong 0xA11 \b, StrongARM
  542. >20 lelong 4000 \b, MIPS R4000
  543. >20 lelong 10003 \b, Hitachi SH3
  544. >20 lelong 10004 \b, Hitachi SH3E
  545. >20 lelong 10005 \b, Hitachi SH4
  546. >20 lelong 70001 \b, ARM 7TDMI
  547. >52 leshort 1 \b, 1 file
  548. >52 leshort >1 \b, %u files
  549. >56 leshort 1 \b, 1 registry entry
  550. >56 leshort >1 \b, %u registry entries
  551. # Windows Enhanced Metafile (EMF)
  552. # See msdn.microsoft.com/archive/en-us/dnargdi/html/msdn_enhmeta.asp
  553. # for further information.
  554. 0 ulelong 1
  555. >40 string \ EMF Windows Enhanced Metafile (EMF) image data
  556. >>44 ulelong x version 0x%x
  557. # From: Alex Beregszaszi <alex@fsn.hu>
  558. 0 string COWD VMWare3
  559. >4 byte 3 disk image
  560. >>32 lelong x (%d/
  561. >>36 lelong x \b%d/
  562. >>40 lelong x \b%d)
  563. >4 byte 2 undoable disk image
  564. >>32 string >\0 (%s)
  565. 0 string VMDK VMware4 disk image
  566. 0 string KDMV VMware4 disk image
  567. #--------------------------------------------------------------------
  568. # Qemu Emulator Images
  569. # Lines written by Friedrich Schwittay (f.schwittay@yousable.de)
  570. # Made by reading sources and doing trial and error on existing
  571. # qcow files
  572. 0 string QFI Qemu Image, Format: Qcow
  573. # Uncomment the following line to display Magic (only used for debugging
  574. # this magic number)
  575. #>0 string x , Magic: %s
  576. # There are currently 2 Versions: "1" and "2"
  577. # I do not use Version 2 and therefor branch here
  578. # but can assure: it works (tested on both versions)
  579. # Also my Qemu 0.9.0 which uses this Version 2 refuses
  580. # to start in its bios
  581. >0x04 belong 2 , Version: 2
  582. >0x04 belong 1 , Version: 1
  583. # Using the existence of the Backing File Offset to Branch or not
  584. # to read Backing File Information
  585. >>0xc belong >0 , Backing File( Offset: %lu
  586. >>>(0xc.L) string >\0 , Path: %s
  587. # Didn't get the trick here how qemu stores the "Size" at this Position
  588. # There is actually something stored but nothing makes sense
  589. # The header in the sources talks about it
  590. #>>>16 lelong x , Size: %lu
  591. # Modification time of the Backing File
  592. # Really useful if you want to know if your backing
  593. # file is still usable together with this image
  594. >>>20 bedate x , Mtime: %s )
  595. # Don't know how to calculate in Magicfiles
  596. # Also: this Information is not reliably
  597. # stored in image-files
  598. >>24 lelong x , Disk Size could be: %d * 256 bytes
  599. 0 string QEVM QEMU's suspend to disk image
  600. 0 string Bochs\ Virtual\ HD\ Image Bochs disk image,
  601. >32 string x type %s,
  602. >48 string x subtype %s
  603. 0 lelong 0x02468ace Bochs Sparse disk image
  604. # from http://filext.com by Derek M Jones <derek@knosof.co.uk>
  605. # False positive with PPT (also currently this string is too long)
  606. #0 string \xD0\xCF\x11\xE0\xA1\xB1\x1A\xE1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x3E\x00\x03\x00\xFE\xFF\x09\x00\x06 Microsoft Installer
  607. 0 string \320\317\021\340\241\261\032\341 Microsoft Office Document
  608. #>48 byte 0x1B Excel Document
  609. #!:mime application/vnd.ms-excel
  610. >546 string bjbj Microsoft Word Document
  611. !:mime application/msword
  612. >546 string jbjb Microsoft Word Document
  613. !:mime application/msword
  614. 0 string \224\246\056 Microsoft Word Document
  615. !:mime application/msword
  616. 512 string R\0o\0o\0t\0\ \0E\0n\0t\0r\0y Microsoft Word Document
  617. !:mime application/msword
  618. # From: "Nelson A. de Oliveira" <naoliv@gmail.com>
  619. # Magic type for Dell's BIOS .hdr files
  620. # Dell's .hdr
  621. 0 string $RBU
  622. >23 string Dell %s system BIOS
  623. >48 string x version %.3s
  624. # Type: Microsoft DirectDraw Surface
  625. # URL: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/directx9_c/directx/graphics/reference/DDSFileReference/ddsfileformat.asp
  626. # From: Morten Hustveit <morten@debian.org>
  627. 0 string DDS\040\174\000\000\000 Microsoft DirectDraw Surface (DDS),
  628. >16 lelong >0 %hd x
  629. >12 lelong >0 %hd,
  630. >84 string x %.4s
  631. # Type: Microsoft Document Imaging Format (.mdi)
  632. # URL: http://en.wikipedia.org/wiki/Microsoft_Document_Imaging_Format
  633. # From: Daniele Sempione <scrows@oziosi.org>
  634. 0 short 0x5045 Microsoft Document Imaging Format
  635. # MS eBook format (.lit)
  636. 0 string ITOLITLS Microsoft Reader eBook Data
  637. >8 lelong x \b, version %u
  638. !:mime application/x-ms-reader