msdos 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968
  1. #------------------------------------------------------------------------------
  2. # $File: msdos,v 1.106 2016/06/11 00:52:14 christos Exp $
  3. # msdos: file(1) magic for MS-DOS files
  4. #
  5. # .BAT files (Daniel Quinlan, quinlan@yggdrasil.com)
  6. # updated by Joerg Jenderek at Oct 2008,Apr 2011
  7. 0 string/t @
  8. >1 string/cW \ echo\ off DOS batch file text
  9. !:mime text/x-msdos-batch
  10. >1 string/cW echo\ off DOS batch file text
  11. !:mime text/x-msdos-batch
  12. >1 string/cW rem DOS batch file text
  13. !:mime text/x-msdos-batch
  14. >1 string/cW set\ DOS batch file text
  15. !:mime text/x-msdos-batch
  16. # OS/2 batch files are REXX. the second regex is a bit generic, oh well
  17. # the matched commands seem to be common in REXX and uncommon elsewhere
  18. 100 search/0xffff rxfuncadd
  19. >100 regex/c =^[\ \t]{0,10}call[\ \t]{1,10}rxfunc OS/2 REXX batch file text
  20. 100 search/0xffff say
  21. >100 regex/c =^[\ \t]{0,10}say\ ['"] OS/2 REXX batch file text
  22. # updated by Joerg Jenderek at Oct 2015
  23. # https://de.wikipedia.org/wiki/Common_Object_File_Format
  24. # http://www.delorie.com/djgpp/doc/coff/filhdr.html
  25. # ./intel already labeled COFF type 0x14c=0514 as "80386 COFF executable"
  26. #0 leshort 0x14c MS Windows COFF Intel 80386 object file
  27. #>4 ledate x stamp %s
  28. 0 leshort 0x166 MS Windows COFF MIPS R4000 object file
  29. #>4 ledate x stamp %s
  30. 0 leshort 0x184 MS Windows COFF Alpha object file
  31. #>4 ledate x stamp %s
  32. 0 leshort 0x268 MS Windows COFF Motorola 68000 object file
  33. #>4 ledate x stamp %s
  34. 0 leshort 0x1f0 MS Windows COFF PowerPC object file
  35. #>4 ledate x stamp %s
  36. 0 leshort 0x290 MS Windows COFF PA-RISC object file
  37. #>4 ledate x stamp %s
  38. # Tests for various EXE types.
  39. #
  40. # Many of the compressed formats were extraced from IDARC 1.23 source code.
  41. #
  42. 0 string/b MZ
  43. # All non-DOS EXE extensions have the relocation table more than 0x40 bytes into the file.
  44. >0x18 leshort <0x40 MS-DOS executable
  45. !:mime application/x-dosexec
  46. # These traditional tests usually work but not always. When test quality support is
  47. # implemented these can be turned on.
  48. #>>0x18 leshort 0x1c (Borland compiler)
  49. #>>0x18 leshort 0x1e (MS compiler)
  50. # If the relocation table is 0x40 or more bytes into the file, it's definitely
  51. # not a DOS EXE.
  52. >0x18 leshort >0x3f
  53. # Maybe it's a PE?
  54. >>(0x3c.l) string PE\0\0 PE
  55. !:mime application/x-dosexec
  56. >>>(0x3c.l+24) leshort 0x010b \b32 executable
  57. >>>(0x3c.l+24) leshort 0x020b \b32+ executable
  58. >>>(0x3c.l+24) leshort 0x0107 ROM image
  59. >>>(0x3c.l+24) default x Unknown PE signature
  60. >>>>&0 leshort x 0x%x
  61. >>>(0x3c.l+22) leshort&0x2000 >0 (DLL)
  62. >>>(0x3c.l+92) leshort 1 (native)
  63. >>>(0x3c.l+92) leshort 2 (GUI)
  64. >>>(0x3c.l+92) leshort 3 (console)
  65. >>>(0x3c.l+92) leshort 7 (POSIX)
  66. >>>(0x3c.l+92) leshort 9 (Windows CE)
  67. >>>(0x3c.l+92) leshort 10 (EFI application)
  68. >>>(0x3c.l+92) leshort 11 (EFI boot service driver)
  69. >>>(0x3c.l+92) leshort 12 (EFI runtime driver)
  70. >>>(0x3c.l+92) leshort 13 (EFI ROM)
  71. >>>(0x3c.l+92) leshort 14 (XBOX)
  72. >>>(0x3c.l+92) leshort 15 (Windows boot application)
  73. >>>(0x3c.l+92) default x (Unknown subsystem
  74. >>>>&0 leshort x 0x%x)
  75. >>>(0x3c.l+4) leshort 0x14c Intel 80386
  76. >>>(0x3c.l+4) leshort 0x166 MIPS R4000
  77. >>>(0x3c.l+4) leshort 0x168 MIPS R10000
  78. >>>(0x3c.l+4) leshort 0x184 Alpha
  79. >>>(0x3c.l+4) leshort 0x1a2 Hitachi SH3
  80. >>>(0x3c.l+4) leshort 0x1a6 Hitachi SH4
  81. >>>(0x3c.l+4) leshort 0x1c0 ARM
  82. >>>(0x3c.l+4) leshort 0x1c2 ARM Thumb
  83. >>>(0x3c.l+4) leshort 0x1c4 ARMv7 Thumb
  84. >>>(0x3c.l+4) leshort 0x1f0 PowerPC
  85. >>>(0x3c.l+4) leshort 0x200 Intel Itanium
  86. >>>(0x3c.l+4) leshort 0x266 MIPS16
  87. >>>(0x3c.l+4) leshort 0x268 Motorola 68000
  88. >>>(0x3c.l+4) leshort 0x290 PA-RISC
  89. >>>(0x3c.l+4) leshort 0x366 MIPSIV
  90. >>>(0x3c.l+4) leshort 0x466 MIPS16 with FPU
  91. >>>(0x3c.l+4) leshort 0xebc EFI byte code
  92. >>>(0x3c.l+4) leshort 0x8664 x86-64
  93. >>>(0x3c.l+4) leshort 0xc0ee MSIL
  94. >>>(0x3c.l+4) default x Unknown processor type
  95. >>>>&0 leshort x 0x%x
  96. >>>(0x3c.l+22) leshort&0x0200 >0 (stripped to external PDB)
  97. >>>(0x3c.l+22) leshort&0x1000 >0 system file
  98. >>>(0x3c.l+24) leshort 0x010b
  99. >>>>(0x3c.l+232) lelong >0 Mono/.Net assembly
  100. >>>(0x3c.l+24) leshort 0x020b
  101. >>>>(0x3c.l+248) lelong >0 Mono/.Net assembly
  102. # hooray, there's a DOS extender using the PE format, with a valid PE
  103. # executable inside (which just prints a message and exits if run in win)
  104. >>>(8.s*16) string 32STUB \b, 32rtm DOS extender
  105. >>>(8.s*16) string !32STUB \b, for MS Windows
  106. >>>(0x3c.l+0xf8) string UPX0 \b, UPX compressed
  107. >>>(0x3c.l+0xf8) search/0x140 PEC2 \b, PECompact2 compressed
  108. >>>(0x3c.l+0xf8) search/0x140 UPX2
  109. >>>>(&0x10.l+(-4)) string PK\3\4 \b, ZIP self-extracting archive (Info-Zip)
  110. >>>(0x3c.l+0xf8) search/0x140 .idata
  111. >>>>(&0xe.l+(-4)) string PK\3\4 \b, ZIP self-extracting archive (Info-Zip)
  112. >>>>(&0xe.l+(-4)) string ZZ0 \b, ZZip self-extracting archive
  113. >>>>(&0xe.l+(-4)) string ZZ1 \b, ZZip self-extracting archive
  114. >>>(0x3c.l+0xf8) search/0x140 .rsrc
  115. >>>>(&0x0f.l+(-4)) string a\\\4\5 \b, WinHKI self-extracting archive
  116. >>>>(&0x0f.l+(-4)) string Rar! \b, RAR self-extracting archive
  117. >>>>(&0x0f.l+(-4)) search/0x3000 MSCF \b, InstallShield self-extracting archive
  118. >>>>(&0x0f.l+(-4)) search/32 Nullsoft \b, Nullsoft Installer self-extracting archive
  119. >>>(0x3c.l+0xf8) search/0x140 .data
  120. >>>>(&0x0f.l) string WEXTRACT \b, MS CAB-Installer self-extracting archive
  121. >>>(0x3c.l+0xf8) search/0x140 .petite\0 \b, Petite compressed
  122. >>>>(0x3c.l+0xf7) byte x
  123. >>>>>(&0x104.l+(-4)) string =!sfx! \b, ACE self-extracting archive
  124. >>>(0x3c.l+0xf8) search/0x140 .WISE \b, WISE installer self-extracting archive
  125. >>>(0x3c.l+0xf8) search/0x140 .dz\0\0\0 \b, Dzip self-extracting archive
  126. >>>&(0x3c.l+0xf8) search/0x100 _winzip_ \b, ZIP self-extracting archive (WinZip)
  127. >>>&(0x3c.l+0xf8) search/0x100 SharedD \b, Microsoft Installer self-extracting archive
  128. >>>0x30 string Inno \b, InnoSetup self-extracting archive
  129. # Hmm, not a PE but the relocation table is too high for a traditional DOS exe,
  130. # must be one of the unusual subformats.
  131. >>(0x3c.l) string !PE\0\0 MS-DOS executable
  132. !:mime application/x-dosexec
  133. >>(0x3c.l) string NE \b, NE
  134. !:mime application/x-dosexec
  135. >>>(0x3c.l+0x36) byte 1 for OS/2 1.x
  136. >>>(0x3c.l+0x36) byte 2 for MS Windows 3.x
  137. >>>(0x3c.l+0x36) byte 3 for MS-DOS
  138. >>>(0x3c.l+0x36) byte 4 for Windows 386
  139. >>>(0x3c.l+0x36) byte 5 for Borland Operating System Services
  140. >>>(0x3c.l+0x36) default x
  141. >>>>(0x3c.l+0x36) byte x (unknown OS %x)
  142. >>>(0x3c.l+0x36) byte 0x81 for MS-DOS, Phar Lap DOS extender
  143. >>>(0x3c.l+0x0c) leshort&0x8003 0x8002 (DLL)
  144. >>>(0x3c.l+0x0c) leshort&0x8003 0x8001 (driver)
  145. >>>&(&0x24.s-1) string ARJSFX \b, ARJ self-extracting archive
  146. >>>(0x3c.l+0x70) search/0x80 WinZip(R)\ Self-Extractor \b, ZIP self-extracting archive (WinZip)
  147. >>(0x3c.l) string LX\0\0 \b, LX
  148. !:mime application/x-dosexec
  149. >>>(0x3c.l+0x0a) leshort <1 (unknown OS)
  150. >>>(0x3c.l+0x0a) leshort 1 for OS/2
  151. >>>(0x3c.l+0x0a) leshort 2 for MS Windows
  152. >>>(0x3c.l+0x0a) leshort 3 for DOS
  153. >>>(0x3c.l+0x0a) leshort >3 (unknown OS)
  154. >>>(0x3c.l+0x10) lelong&0x28000 =0x8000 (DLL)
  155. >>>(0x3c.l+0x10) lelong&0x20000 >0 (device driver)
  156. >>>(0x3c.l+0x10) lelong&0x300 0x300 (GUI)
  157. >>>(0x3c.l+0x10) lelong&0x28300 <0x300 (console)
  158. >>>(0x3c.l+0x08) leshort 1 i80286
  159. >>>(0x3c.l+0x08) leshort 2 i80386
  160. >>>(0x3c.l+0x08) leshort 3 i80486
  161. >>>(8.s*16) string emx \b, emx
  162. >>>>&1 string x %s
  163. >>>&(&0x54.l-3) string arjsfx \b, ARJ self-extracting archive
  164. # MS Windows system file, supposedly a collection of LE executables
  165. >>(0x3c.l) string W3 \b, W3 for MS Windows
  166. !:mime application/x-dosexec
  167. >>(0x3c.l) string LE\0\0 \b, LE executable
  168. !:mime application/x-dosexec
  169. >>>(0x3c.l+0x0a) leshort 1
  170. # some DOS extenders use LE files with OS/2 header
  171. >>>>0x240 search/0x100 DOS/4G for MS-DOS, DOS4GW DOS extender
  172. >>>>0x240 search/0x200 WATCOM\ C/C++ for MS-DOS, DOS4GW DOS extender
  173. >>>>0x440 search/0x100 CauseWay\ DOS\ Extender for MS-DOS, CauseWay DOS extender
  174. >>>>0x40 search/0x40 PMODE/W for MS-DOS, PMODE/W DOS extender
  175. >>>>0x40 search/0x40 STUB/32A for MS-DOS, DOS/32A DOS extender (stub)
  176. >>>>0x40 search/0x80 STUB/32C for MS-DOS, DOS/32A DOS extender (configurable stub)
  177. >>>>0x40 search/0x80 DOS/32A for MS-DOS, DOS/32A DOS extender (embedded)
  178. # this is a wild guess; hopefully it is a specific signature
  179. >>>>&0x24 lelong <0x50
  180. >>>>>(&0x4c.l) string \xfc\xb8WATCOM
  181. >>>>>>&0 search/8 3\xdbf\xb9 \b, 32Lite compressed
  182. # another wild guess: if real OS/2 LE executables exist, they probably have higher start EIP
  183. #>>>>(0x3c.l+0x1c) lelong >0x10000 for OS/2
  184. # fails with DOS-Extenders.
  185. >>>(0x3c.l+0x0a) leshort 2 for MS Windows
  186. >>>(0x3c.l+0x0a) leshort 3 for DOS
  187. >>>(0x3c.l+0x0a) leshort 4 for MS Windows (VxD)
  188. >>>(&0x7c.l+0x26) string UPX \b, UPX compressed
  189. >>>&(&0x54.l-3) string UNACE \b, ACE self-extracting archive
  190. # looks like ASCII, probably some embedded copyright message.
  191. # and definitely not NE/LE/LX/PE
  192. >>0x3c lelong >0x20000000
  193. >>>(4.s*512) leshort !0x014c \b, MZ for MS-DOS
  194. !:mime application/x-dosexec
  195. # header data too small for extended executable
  196. >2 long !0
  197. >>0x18 leshort <0x40
  198. >>>(4.s*512) leshort !0x014c
  199. >>>>&(2.s-514) string !LE
  200. >>>>>&-2 string !BW \b, MZ for MS-DOS
  201. !:mime application/x-dosexec
  202. >>>>&(2.s-514) string LE \b, LE
  203. >>>>>0x240 search/0x100 DOS/4G for MS-DOS, DOS4GW DOS extender
  204. # educated guess since indirection is still not capable enough for complex offset
  205. # calculations (next embedded executable would be at &(&2*512+&0-2)
  206. # I suspect there are only LE executables in these multi-exe files
  207. >>>>&(2.s-514) string BW
  208. >>>>>0x240 search/0x100 DOS/4G \b, LE for MS-DOS, DOS4GW DOS extender (embedded)
  209. >>>>>0x240 search/0x100 !DOS/4G \b, BW collection for MS-DOS
  210. # This sequence skips to the first COFF segment, usually .text
  211. >(4.s*512) leshort 0x014c \b, COFF
  212. !:mime application/x-dosexec
  213. >>(8.s*16) string go32stub for MS-DOS, DJGPP go32 DOS extender
  214. >>(8.s*16) string emx
  215. >>>&1 string x for DOS, Win or OS/2, emx %s
  216. >>&(&0x42.l-3) byte x
  217. >>>&0x26 string UPX \b, UPX compressed
  218. # and yet another guess: small .text, and after large .data is unusal, could be 32lite
  219. >>&0x2c search/0xa0 .text
  220. >>>&0x0b lelong <0x2000
  221. >>>>&0 lelong >0x6000 \b, 32lite compressed
  222. >(8.s*16) string $WdX \b, WDos/X DOS extender
  223. # By now an executable type should have been printed out. The executable
  224. # may be a self-uncompressing archive, so look for evidence of that and
  225. # print it out.
  226. #
  227. # Some signatures below from Greg Roelofs, newt@uchicago.edu.
  228. #
  229. >0x35 string \x8e\xc0\xb9\x08\x00\xf3\xa5\x4a\x75\xeb\x8e\xc3\x8e\xd8\x33\xff\xbe\x30\x00\x05 \b, aPack compressed
  230. >0xe7 string LH/2\ Self-Extract \b, %s
  231. >0x1c string UC2X \b, UCEXE compressed
  232. >0x1c string WWP\ \b, WWPACK compressed
  233. >0x1c string RJSX \b, ARJ self-extracting archive
  234. >0x1c string diet \b, diet compressed
  235. >0x1c string LZ09 \b, LZEXE v0.90 compressed
  236. >0x1c string LZ91 \b, LZEXE v0.91 compressed
  237. >0x1c string tz \b, TinyProg compressed
  238. >0x1e string Copyright\ 1989-1990\ PKWARE\ Inc. Self-extracting PKZIP archive
  239. !:mime application/zip
  240. # Yes, this really is "Copr", not "Corp."
  241. >0x1e string PKLITE\ Copr. Self-extracting PKZIP archive
  242. !:mime application/zip
  243. # winarj stores a message in the stub instead of the sig in the MZ header
  244. >0x20 search/0xe0 aRJsfX \b, ARJ self-extracting archive
  245. >0x20 string AIN
  246. >>0x23 string 2 \b, AIN 2.x compressed
  247. >>0x23 string <2 \b, AIN 1.x compressed
  248. >>0x23 string >2 \b, AIN 1.x compressed
  249. >0x24 string LHa's\ SFX \b, LHa self-extracting archive
  250. !:mime application/x-lha
  251. >0x24 string LHA's\ SFX \b, LHa self-extracting archive
  252. !:mime application/x-lha
  253. >0x24 string \ $ARX \b, ARX self-extracting archive
  254. >0x24 string \ $LHarc \b, LHarc self-extracting archive
  255. >0x20 string SFX\ by\ LARC \b, LARC self-extracting archive
  256. >0x40 string aPKG \b, aPackage self-extracting archive
  257. >0x64 string W\ Collis\0\0 \b, Compack compressed
  258. >0x7a string Windows\ self-extracting\ ZIP \b, ZIP self-extracting archive
  259. >>&0xf4 search/0x140 \x0\x40\x1\x0
  260. >>>(&0.l+(4)) string MSCF \b, WinHKI CAB self-extracting archive
  261. >1638 string -lh5- \b, LHa self-extracting archive v2.13S
  262. >0x17888 string Rar! \b, RAR self-extracting archive
  263. # Skip to the end of the EXE. This will usually work fine in the PE case
  264. # because the MZ image is hardcoded into the toolchain and almost certainly
  265. # won't match any of these signatures.
  266. >(4.s*512) long x
  267. >>&(2.s-517) byte x
  268. >>>&0 string PK\3\4 \b, ZIP self-extracting archive
  269. >>>&0 string Rar! \b, RAR self-extracting archive
  270. >>>&0 string =!\x11 \b, AIN 2.x self-extracting archive
  271. >>>&0 string =!\x12 \b, AIN 2.x self-extracting archive
  272. >>>&0 string =!\x17 \b, AIN 1.x self-extracting archive
  273. >>>&0 string =!\x18 \b, AIN 1.x self-extracting archive
  274. >>>&7 search/400 **ACE** \b, ACE self-extracting archive
  275. >>>&0 search/0x480 UC2SFX\ Header \b, UC2 self-extracting archive
  276. # a few unknown ZIP sfxes, no idea if they are needed or if they are
  277. # already captured by the generic patterns above
  278. >(8.s*16) search/0x20 PKSFX \b, ZIP self-extracting archive (PKZIP)
  279. # TODO: how to add this? >FileSize-34 string Windows\ Self-Installing\ Executable \b, ZIP self-extracting archive
  280. #
  281. # TELVOX Teleinformatica CODEC self-extractor for OS/2:
  282. >49801 string \x79\xff\x80\xff\x76\xff \b, CODEC archive v3.21
  283. >>49824 leshort =1 \b, 1 file
  284. >>49824 leshort >1 \b, %u files
  285. # added by Joerg Jenderek of http://www.freedos.org/software/?prog=kc
  286. # and http://www.freedos.org/software/?prog=kpdos
  287. # for FreeDOS files like KEYBOARD.SYS, KEYBRD2.SYS, KEYBRD3.SYS, *.KBD
  288. 0 string/b KCF FreeDOS KEYBoard Layout collection
  289. # only version=0x100 found
  290. >3 uleshort x \b, version 0x%x
  291. # length of string containing author,info and special characters
  292. >6 ubyte >0
  293. #>>6 pstring x \b, name=%s
  294. >>7 string >\0 \b, author=%-.14s
  295. >>7 search/254 \xff \b, info=
  296. #>>>&0 string x \b%-s
  297. >>>&0 string x \b%-.15s
  298. # for FreeDOS *.KL files
  299. 0 string/b KLF FreeDOS KEYBoard Layout file
  300. # only version=0x100 or 0x101 found
  301. >3 uleshort x \b, version 0x%x
  302. # stringlength
  303. >5 ubyte >0
  304. >>8 string x \b, name=%-.2s
  305. 0 string \xffKEYB\ \ \ \0\0\0\0
  306. >12 string \0\0\0\0`\004\360 MS-DOS KEYBoard Layout file
  307. # .COM formats (Daniel Quinlan, quinlan@yggdrasil.com)
  308. # Uncommenting only the first two lines will cover about 2/3 of COM files,
  309. # but it isn't feasible to match all COM files since there must be at least
  310. # two dozen different one-byte "magics".
  311. # test too generic ?
  312. 0 byte 0xe9 DOS executable (COM)
  313. >0x1FE leshort 0xAA55 \b, boot code
  314. >6 string SFX\ of\ LHarc (%s)
  315. # DOS device driver updated by Joerg Jenderek at May 2011
  316. # http://maben.homeip.net/static/S100/IBM/software/DOS/DOS%20techref/CHAPTER.009
  317. 0 ulequad&0x07a0ffffffff 0xffffffff DOS executable (
  318. >40 search/7 UPX! \bUPX compressed
  319. # DOS device driver attributes
  320. >4 uleshort&0x8000 0x0000 \bblock device driver
  321. # character device
  322. >4 uleshort&0x8000 0x8000 \b
  323. >>4 uleshort&0x0008 0x0008 \bclock
  324. # fast video output by int 29h
  325. >>4 uleshort&0x0010 0x0010 \bfast
  326. # standard input/output device
  327. >>4 uleshort&0x0003 >0 \bstandard
  328. >>>4 uleshort&0x0001 0x0001 \binput
  329. >>>4 uleshort&0x0003 0x0003 \b/
  330. >>>4 uleshort&0x0002 0x0002 \boutput
  331. >>4 uleshort&0x8000 0x8000 \bcharacter device driver
  332. >0 ubyte x
  333. # upx compressed device driver has garbage instead of real in name field of header
  334. >>40 search/7 UPX!
  335. >>40 default x
  336. # leading/trailing nulls, zeros or non ASCII characters in 8-byte name field at offset 10 are skipped
  337. >>>12 ubyte >0x27 \b
  338. >>>>10 ubyte >0x20
  339. >>>>>10 ubyte !0x2E
  340. >>>>>>10 ubyte !0x2A \b%c
  341. >>>>11 ubyte >0x20
  342. >>>>>11 ubyte !0x2E \b%c
  343. >>>>12 ubyte >0x20
  344. >>>>>12 ubyte !0x39
  345. >>>>>>12 ubyte !0x2E \b%c
  346. >>>13 ubyte >0x20
  347. >>>>13 ubyte !0x2E \b%c
  348. >>>>14 ubyte >0x20
  349. >>>>>14 ubyte !0x2E \b%c
  350. >>>>15 ubyte >0x20
  351. >>>>>15 ubyte !0x2E \b%c
  352. >>>>16 ubyte >0x20
  353. >>>>>16 ubyte !0x2E
  354. >>>>>>16 ubyte <0xCB \b%c
  355. >>>>17 ubyte >0x20
  356. >>>>>17 ubyte !0x2E
  357. >>>>>>17 ubyte <0x90 \b%c
  358. # some character device drivers like ASPICD.SYS, btcdrom.sys and Cr_atapi.sys contain only spaces or points in name field
  359. >>>4 uleshort&0x8000 0x8000
  360. >>>>12 ubyte <0x2F
  361. # they have their real name at offset 22
  362. >>>>>22 string >\0 \b%-.5s
  363. >4 uleshort&0x8000 0x0000
  364. # 32 bit sector addressing ( > 32 MB) for block devices
  365. >>4 uleshort&0x0002 0x0002 \b,32-bit sector-
  366. # support by driver functions 13h, 17h, 18h
  367. >4 uleshort&0x0040 0x0040 \b,IOCTL-
  368. # open, close, removable media support by driver functions 0Dh, 0Eh, 0Fh
  369. >4 uleshort&0x0800 0x0800 \b,close media-
  370. # output until busy support by int 10h for character device driver
  371. >4 uleshort&0x8000 0x8000
  372. >>4 uleshort&0x2000 0x2000 \b,until busy-
  373. # direct read/write support by driver functions 03h,0Ch
  374. >4 uleshort&0x4000 0x4000 \b,control strings-
  375. >4 uleshort&0x8000 0x8000
  376. >>4 uleshort&0x6840 >0 \bsupport
  377. >4 uleshort&0x8000 0x0000
  378. >>4 uleshort&0x4842 >0 \bsupport
  379. >0 ubyte x \b)
  380. # DOS driver cmd640x.sys has 0x12 instead of 0xffffffff for pointer field to next device header
  381. # Too weak, matches files that only contain 0's
  382. #0 ulequad&0x000007a0ffffffed 0x0000000000000000 DOS-executable (
  383. #>4 uleshort&0x8000 0x8000 \bcharacter device driver
  384. #>>10 string x %-.8s
  385. #>4 uleshort&0x4000 0x4000 \b,control strings-support)
  386. # updated by Joerg Jenderek
  387. # GRR: line below too general as it catches also
  388. # rt.lib DYADISKS.PIC and many more
  389. # start with assembler instruction MOV
  390. 0 ubyte 0x8c
  391. # skip "AppleWorks word processor data" like ARTICLE.1 ./apple
  392. >4 string !O====
  393. # skip some unknown basic binaries like RocketRnger.SHR
  394. >>5 string !MAIN
  395. # skip "GPG symmetrically encrypted data" ./gnu
  396. # skip "PGP symmetric key encrypted data" ./pgp
  397. # openpgpdefs.h: fourth byte < 14 indicate cipher algorithm type
  398. >>>4 ubyte >13 DOS executable (COM, 0x8C-variant)
  399. # the remaining files should be DOS *.COM executables
  400. # dosshell.COM 8cc0 2ea35f07 e85211 e88a11 b80058 cd
  401. # hmload.COM 8cc8 8ec0 bbc02b 89dc 83c30f c1eb04 b4
  402. # UNDELETE.COM 8cca 2e8916 6503 b430 cd21 8b 2e0200 8b
  403. # BOOTFIX.COM 8cca 2e8916 9603 b430 cd21 8b 2e0200 8b
  404. # RAWRITE3.COM 8cca 2e8916 d602 b430 cd21 8b 2e0200 8b
  405. # SHARE.COM 8cca 2e8916 d602 b430 cd21 8b 2e0200 8b
  406. # validchr.COM 8cca 2e8916 9603 b430 cd21 8b 2e028b1e
  407. # devload.COM 8cca 8916ad01 b430 cd21 8b2e0200 892e
  408. !:mime application/x-dosexec
  409. !:ext com
  410. # updated by Joerg Jenderek at Oct 2008
  411. 0 ulelong 0xffff10eb DR-DOS executable (COM)
  412. # byte 0xeb conflicts with "sequent" magic leshort 0xn2eb
  413. 0 ubeshort&0xeb8d >0xeb00
  414. # DR-DOS STACKER.COM SCREATE.SYS missed
  415. >0 byte 0xeb
  416. >>0x1FE leshort 0xAA55 DOS executable (COM), boot code
  417. >>85 string UPX DOS executable (COM), UPX compressed
  418. >>4 string \ $ARX DOS executable (COM), ARX self-extracting archive
  419. >>4 string \ $LHarc DOS executable (COM), LHarc self-extracting archive
  420. >>0x20e string SFX\ by\ LARC DOS executable (COM), LARC self-extracting archive
  421. # updated by Joerg Jenderek at Oct 2008,2015
  422. # following line is too general
  423. 0 ubyte 0xb8
  424. # skip 2 linux kernels like memtest.bin with "\xb8\xc0\x07\x8e" in ./linux
  425. >0 string !\xb8\xc0\x07\x8e
  426. # modified by Joerg Jenderek
  427. # syslinux COM32 or COM32R executable
  428. >>1 lelong&0xFFFFFFFe 0x21CD4CFe COM executable (32-bit COMBOOT
  429. # http://www.syslinux.org/wiki/index.php/Comboot_API
  430. # Since version 5.00 c32 modules switched from the COM32 object format to ELF
  431. !:mime application/x-c32-comboot-syslinux-exec
  432. !:ext c32
  433. # http://syslinux.zytor.com/comboot.php
  434. # older syslinux version ( <4 )
  435. # (32-bit COMBOOT) programs *.C32 contain 32-bit code and run in flat-memory 32-bit protected mode
  436. # start with assembler instructions mov eax,21cd4cffh
  437. >>>1 lelong 0x21CD4CFf \b)
  438. # syslinux:doc/comboot.txt
  439. # A COM32R program must start with the byte sequence B8 FE 4C CD 21 (mov
  440. # eax,21cd4cfeh) as a magic number.
  441. # syslinux version (4.x)
  442. # "COM executable (COM32R)" or "Syslinux COM32 module" by TrID
  443. >>>1 lelong 0x21CD4CFe \b, relocatable)
  444. # remaining are DOS COM executables starting with assembler instruction MOV
  445. # like FreeDOS BANNER*.COM FINDDISK.COM GIF2RAW.COM WINCHK.COM
  446. # MS-DOS SYS.COM RESTART.COM
  447. # SYSLINUX.COM (version 1.40 - 2.13)
  448. # GFXBOOT.COM (version 3.75)
  449. # COPYBS.COM POWEROFF.COM INT18.COM
  450. >>1 default x COM executable for DOS
  451. !:mime application/x-dosexec
  452. #!:mime application/x-ms-dos-executable
  453. #!:mime application/x-msdos-program
  454. !:ext com
  455. 0 string/b \x81\xfc
  456. >4 string \x77\x02\xcd\x20\xb9
  457. >>36 string UPX! FREE-DOS executable (COM), UPX compressed
  458. 252 string Must\ have\ DOS\ version DR-DOS executable (COM)
  459. # added by Joerg Jenderek at Oct 2008
  460. # GRR search is not working
  461. #34 search/2 UPX! FREE-DOS executable (COM), UPX compressed
  462. 34 string UPX! FREE-DOS executable (COM), UPX compressed
  463. 35 string UPX! FREE-DOS executable (COM), UPX compressed
  464. # GRR search is not working
  465. #2 search/28 \xcd\x21 COM executable for MS-DOS
  466. #WHICHFAT.cOM
  467. 2 string \xcd\x21 COM executable for DOS
  468. #DELTREE.cOM DELTREE2.cOM
  469. 4 string \xcd\x21 COM executable for DOS
  470. #IFMEMDSK.cOM ASSIGN.cOM COMP.cOM
  471. 5 string \xcd\x21 COM executable for DOS
  472. #DELTMP.COm HASFAT32.cOM
  473. 7 string \xcd\x21
  474. >0 byte !0xb8 COM executable for DOS
  475. #COMP.cOM MORE.COm
  476. 10 string \xcd\x21
  477. >5 string !\xcd\x21 COM executable for DOS
  478. #comecho.com
  479. 13 string \xcd\x21 COM executable for DOS
  480. #HELP.COm EDIT.coM
  481. 18 string \xcd\x21 COM executable for MS-DOS
  482. #NWRPLTRM.COm
  483. 23 string \xcd\x21 COM executable for MS-DOS
  484. #LOADFIX.cOm LOADFIX.cOm
  485. 30 string \xcd\x21 COM executable for MS-DOS
  486. #syslinux.com 3.11
  487. 70 string \xcd\x21 COM executable for DOS
  488. # many compressed/converted COMs start with a copy loop instead of a jump
  489. 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
  490. 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for DOS
  491. >0x18 search/0x10 \x50\xa4\xff\xd5\x73 \b, aPack compressed
  492. 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
  493. # FIXME: missing diet .com compression
  494. # miscellaneous formats
  495. 0 string/b LZ MS-DOS executable (built-in)
  496. #0 byte 0xf0 MS-DOS program library data
  497. #
  498. # AAF files:
  499. # <stuartc@rd.bbc.co.uk> Stuart Cunningham
  500. 0 string/b \320\317\021\340\241\261\032\341AAFB\015\000OM\006\016\053\064\001\001\001\377 AAF legacy file using MS Structured Storage
  501. >30 byte 9 (512B sectors)
  502. >30 byte 12 (4kB sectors)
  503. 0 string/b \320\317\021\340\241\261\032\341\001\002\001\015\000\002\000\000\006\016\053\064\003\002\001\001 AAF file using MS Structured Storage
  504. >30 byte 9 (512B sectors)
  505. >30 byte 12 (4kB sectors)
  506. # Popular applications
  507. 2080 string Microsoft\ Word\ 6.0\ Document %s
  508. !:mime application/msword
  509. 2080 string Documento\ Microsoft\ Word\ 6 Spanish Microsoft Word 6 document data
  510. !:mime application/msword
  511. # Pawel Wiecek <coven@i17linuxb.ists.pwr.wroc.pl> (for polish Word)
  512. 2112 string MSWordDoc Microsoft Word document data
  513. !:mime application/msword
  514. #
  515. 0 belong 0x31be0000 Microsoft Word Document
  516. !:mime application/msword
  517. #
  518. 0 string/b PO^Q` Microsoft Word 6.0 Document
  519. !:mime application/msword
  520. #
  521. 0 string/b \376\067\0\043 Microsoft Office Document
  522. !:mime application/msword
  523. 0 string/b \333\245-\0\0\0 Microsoft Office Document
  524. !:mime application/msword
  525. 512 string/b \354\245\301 Microsoft Word Document
  526. !:mime application/msword
  527. #
  528. 0 string/b \xDB\xA5\x2D\x00 Microsoft WinWord 2.0 Document
  529. !:mime application/msword
  530. #
  531. 2080 string Microsoft\ Excel\ 5.0\ Worksheet %s
  532. !:mime application/vnd.ms-excel
  533. #
  534. 0 string/b \xDB\xA5\x2D\x00 Microsoft WinWord 2.0 Document
  535. !:mime application/msword
  536. 2080 string Foglio\ di\ lavoro\ Microsoft\ Exce %s
  537. !:mime application/vnd.ms-excel
  538. #
  539. # Pawel Wiecek <coven@i17linuxb.ists.pwr.wroc.pl> (for polish Excel)
  540. 2114 string Biff5 Microsoft Excel 5.0 Worksheet
  541. !:mime application/vnd.ms-excel
  542. # Italian MS-Excel
  543. 2121 string Biff5 Microsoft Excel 5.0 Worksheet
  544. !:mime application/vnd.ms-excel
  545. 0 string/b \x09\x04\x06\x00\x00\x00\x10\x00 Microsoft Excel Worksheet
  546. !:mime application/vnd.ms-excel
  547. #
  548. 0 belong 0x00001a00 Lotus 1-2-3
  549. !:mime application/x-123
  550. >4 belong 0x00100400 wk3 document data
  551. >4 belong 0x02100400 wk4 document data
  552. >4 belong 0x07800100 fm3 or fmb document data
  553. >4 belong 0x07800000 fm3 or fmb document data
  554. #
  555. 0 belong 0x00000200 Lotus 1-2-3
  556. !:mime application/x-123
  557. >4 belong 0x06040600 wk1 document data
  558. >4 belong 0x06800200 fmt document data
  559. 0 string/b WordPro\0 Lotus WordPro
  560. !:mime application/vnd.lotus-wordpro
  561. 0 string/b WordPro\r\373 Lotus WordPro
  562. !:mime application/vnd.lotus-wordpro
  563. # Summary: Script used by InstallScield to uninstall applications
  564. # Extension: .isu
  565. # Submitted by: unknown
  566. # Modified by (1): Abel Cheung <abelcheung@gmail.com> (replace useless entry)
  567. 0 string \x71\xa8\x00\x00\x01\x02
  568. >12 string Stirling\ Technologies, InstallShield Uninstall Script
  569. # Winamp .avs
  570. #0 string Nullsoft\ AVS\ Preset\ \060\056\061\032 A plug in for Winamp ms-windows Freeware media player
  571. 0 string/b Nullsoft\ AVS\ Preset\ Winamp plug in
  572. # Windows Metafont .WMF
  573. 0 string/b \327\315\306\232 ms-windows metafont .wmf
  574. 0 string/b \002\000\011\000 ms-windows metafont .wmf
  575. 0 string/b \001\000\011\000 ms-windows metafont .wmf
  576. #tz3 files whatever that is (MS Works files)
  577. 0 string/b \003\001\001\004\070\001\000\000 tz3 ms-works file
  578. 0 string/b \003\002\001\004\070\001\000\000 tz3 ms-works file
  579. 0 string/b \003\003\001\004\070\001\000\000 tz3 ms-works file
  580. # PGP sig files .sig
  581. #0 string \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig
  582. 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig
  583. 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig
  584. 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig
  585. 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig
  586. 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig
  587. 0 string \211\000\225\003\005\000\062\122\207\304\100\345\042 PGP sig
  588. # windows zips files .dmf
  589. 0 string/b MDIF\032\000\010\000\000\000\372\046\100\175\001\000\001\036\001\000 MS Windows special zipped file
  590. #ico files
  591. 0 string/b \102\101\050\000\000\000\056\000\000\000\000\000\000\000 Icon for MS Windows
  592. # Windows icons
  593. # Update: Joerg Jenderek
  594. # URL: https://en.wikipedia.org/wiki/CUR_(file_format)
  595. # Note: similiar to Windows CURsor. container for BMP (only DIB part) or PNG
  596. 0 belong 0x00000100
  597. >9 byte 0
  598. >>0 byte x
  599. >>0 use cur-ico-dir
  600. >9 ubyte 0xff
  601. >>0 byte x
  602. >>0 use cur-ico-dir
  603. # displays number of icons and information for icon or cursor
  604. 0 name cur-ico-dir
  605. # skip some Lotus 1-2-3 worksheets, CYCLE.PIC and keep Windows cursors with
  606. # 1st data offset = dir header size + n * dir entry size = 6 + n * 10h = ?6h
  607. >18 ulelong &0x00000006
  608. # skip remaining worksheets, because valid only for DIB image (40) or PNG image (\x89PNG)
  609. >>(18.l) ulelong x MS Windows
  610. >>>0 ubelong 0x00000100 icon resource
  611. #!:mime image/vnd.microsoft.icon
  612. !:mime image/x-icon
  613. !:ext ico
  614. >>>>4 uleshort x - %d icon
  615. # plural s
  616. >>>>4 uleshort >1 \bs
  617. # 1st icon
  618. >>>>0x06 use ico-entry
  619. # 2nd icon
  620. >>>>4 uleshort >1
  621. >>>>>0x16 use ico-entry
  622. >>>0 ubelong 0x00000200 cursor resource
  623. #!:mime image/x-cur
  624. !:mime image/x-win-bitmap
  625. !:ext cur
  626. >>>>4 uleshort x - %d icon
  627. >>>>4 uleshort >1 \bs
  628. # 1st cursor
  629. >>>>0x06 use cur-entry
  630. #>>>>0x16 use cur-entry
  631. # display information of one cursor entry
  632. 0 name cur-entry
  633. >0 use cur-ico-entry
  634. >4 uleshort x \b, hotspot @%dx
  635. >6 uleshort x \b%d
  636. # display information of one icon entry
  637. 0 name ico-entry
  638. >0 use cur-ico-entry
  639. # normally 0 1 but also found 14
  640. >4 uleshort >1 \b, %d planes
  641. # normally 0 1 but also found some 3, 4, some 6, 8, 24, many 32, two 256
  642. >6 uleshort >1 \b, %d bits/pixel
  643. # display shared information of cursor or icon entry
  644. 0 name cur-ico-entry
  645. >0 byte =0 \b, 256x
  646. >0 byte !0 \b, %dx
  647. >1 byte =0 \b256
  648. >1 byte !0 \b%d
  649. # number of colors in palette
  650. >2 ubyte !0 \b, %d colors
  651. # reserved 0 FFh
  652. #>3 ubyte x \b, reserved %x
  653. #>8 ulelong x \b, image size %d
  654. # offset of PNG or DIB image
  655. #>12 ulelong x \b, offset 0x%x
  656. # PNG header (\x89PNG)
  657. >(12.l) ubelong =0x89504e47
  658. >>&-4 indirect x \b with
  659. # DIB image
  660. >(12.l) ubelong !0x89504e47
  661. #>>&-4 use dib-image
  662. # Windows non-animated cursors
  663. # Update: Joerg Jenderek
  664. # URL: https://en.wikipedia.org/wiki/CUR_(file_format)
  665. # Note: similiar to Windows ICOn. container for BMP ( only DIB part)
  666. # GRR: line below is too general as it catches also Lotus 1-2-3 files
  667. 0 belong 0x00000200
  668. >9 byte 0
  669. >>0 use cur-ico-dir
  670. >9 ubyte 0xff
  671. >>0 use cur-ico-dir
  672. # .chr files
  673. 0 string/b PK\010\010BGI Borland font
  674. >4 string >\0 %s
  675. # then there is a copyright notice
  676. # .bgi files
  677. 0 string/b pk\010\010BGI Borland device
  678. >4 string >\0 %s
  679. # then there is a copyright notice
  680. # Windows Recycle Bin record file (named INFO2)
  681. # By Abel Cheung (abelcheung AT gmail dot com)
  682. # Version 4 always has 280 bytes (0x118) per record, version 5 has 800 bytes
  683. # Since Vista uses another structure, INFO2 structure probably won't change
  684. # anymore. Detailed analysis in:
  685. # http://www.cybersecurityinstitute.biz/downloads/INFO2.pdf
  686. 0 lelong 0x00000004
  687. >12 lelong 0x00000118 Windows Recycle Bin INFO2 file (Win98 or below)
  688. 0 lelong 0x00000005
  689. >12 lelong 0x00000320 Windows Recycle Bin INFO2 file (Win2k - WinXP)
  690. ##### put in Either Magic/font or Magic/news
  691. # Acroread or something files wrongly identified as G3 .pfm
  692. # these have the form \000 \001 any? \002 \000 \000
  693. # or \000 \001 any? \022 \000 \000
  694. 0 belong&0xffff00ff 0x00010012 PFM data
  695. >4 string \000\000
  696. >6 string >\060 - %s
  697. 0 belong&0xffff00ff 0x00010002 PFM data
  698. >4 string \000\000
  699. >6 string >\060 - %s
  700. #0 string \000\001 pfm?
  701. #>3 string \022\000\000Copyright\ yes
  702. #>3 string \002\000\000Copyright\ yes
  703. #>3 string >\0 oops, not a font file. Cancel that.
  704. #it clashes with ttf files so put it lower down.
  705. # From Doug Lee via a FreeBSD pr
  706. 9 string GERBILDOC First Choice document
  707. 9 string GERBILDB First Choice database
  708. 9 string GERBILCLIP First Choice database
  709. 0 string GERBIL First Choice device file
  710. 9 string RABBITGRAPH RabbitGraph file
  711. 0 string DCU1 Borland Delphi .DCU file
  712. 0 string =!<spell> MKS Spell hash list (old format)
  713. 0 string =!<spell2> MKS Spell hash list
  714. # Too simple - MPi
  715. #0 string AH Halo(TM) bitmapped font file
  716. 0 lelong 0x08086b70 TurboC BGI file
  717. 0 lelong 0x08084b50 TurboC Font file
  718. # Debian#712046: The magic below identifies "Delphi compiled form data".
  719. # An additional source of information is available at:
  720. # http://www.woodmann.com/fravia/dafix_t1.htm
  721. 0 string TPF0
  722. >4 pstring >\0 Delphi compiled form '%s'
  723. # tests for DBase files moved, updated and merged to database
  724. 0 string PMCC Windows 3.x .GRP file
  725. 1 string RDC-meg MegaDots
  726. >8 byte >0x2F version %c
  727. >9 byte >0x2F \b.%c file
  728. 0 lelong 0x4C
  729. >4 lelong 0x00021401 Windows shortcut file
  730. # .PIF files added by Joerg Jenderek from http://smsoft.ru/en/pifdoc.htm
  731. # only for windows versions equal or greater 3.0
  732. 0x171 string MICROSOFT\ PIFEX\0 Windows Program Information File
  733. !:mime application/x-dosexec
  734. #>2 string >\0 \b, Title:%.30s
  735. >0x24 string >\0 \b for %.63s
  736. >0x65 string >\0 \b, directory=%.64s
  737. >0xA5 string >\0 \b, parameters=%.64s
  738. #>0x181 leshort x \b, offset %x
  739. #>0x183 leshort x \b, offsetdata %x
  740. #>0x185 leshort x \b, section length %x
  741. >0x187 search/0xB55 WINDOWS\ VMM\ 4.0\0
  742. >>&0x5e ubyte >0
  743. >>>&-1 string <PIFMGR.DLL \b, icon=%s
  744. #>>>&-1 string PIFMGR.DLL \b, icon=%s
  745. >>>&-1 string >PIFMGR.DLL \b, icon=%s
  746. >>&0xF0 ubyte >0
  747. >>>&-1 string <Terminal \b, font=%.32s
  748. #>>>&-1 string =Terminal \b, font=%.32s
  749. >>>&-1 string >Terminal \b, font=%.32s
  750. >>&0x110 ubyte >0
  751. >>>&-1 string <Lucida\ Console \b, TrueTypeFont=%.32s
  752. #>>>&-1 string =Lucida\ Console \b, TrueTypeFont=%.32s
  753. >>>&-1 string >Lucida\ Console \b, TrueTypeFont=%.32s
  754. #>0x187 search/0xB55 WINDOWS\ 286\ 3.0\0 \b, Windows 3.X standard mode-style
  755. #>0x187 search/0xB55 WINDOWS\ 386\ 3.0\0 \b, Windows 3.X enhanced mode-style
  756. >0x187 search/0xB55 WINDOWS\ NT\ \ 3.1\0 \b, Windows NT-style
  757. #>0x187 search/0xB55 WINDOWS\ NT\ \ 4.0\0 \b, Windows NT-style
  758. >0x187 search/0xB55 CONFIG\ \ SYS\ 4.0\0 \b +CONFIG.SYS
  759. #>>&06 string x \b:%s
  760. >0x187 search/0xB55 AUTOEXECBAT\ 4.0\0 \b +AUTOEXEC.BAT
  761. #>>&06 string x \b:%s
  762. # DOS EPS Binary File Header
  763. # From: Ed Sznyter <ews@Black.Market.NET>
  764. 0 belong 0xC5D0D3C6 DOS EPS Binary File
  765. >4 long >0 Postscript starts at byte %d
  766. >>8 long >0 length %d
  767. >>>12 long >0 Metafile starts at byte %d
  768. >>>>16 long >0 length %d
  769. >>>20 long >0 TIFF starts at byte %d
  770. >>>>24 long >0 length %d
  771. # TNEF magic From "Joomy" <joomy@se-ed.net>
  772. # Microsoft Outlook's Transport Neutral Encapsulation Format (TNEF)
  773. 0 leshort 0x223e9f78 TNEF
  774. !:mime application/vnd.ms-tnef
  775. # Norton Guide (.NG , .HLP) files added by Joerg Jenderek from source NG2HTML.C
  776. # of http://www.davep.org/norton-guides/ng2h-105.tgz
  777. # http://en.wikipedia.org/wiki/Norton_Guides
  778. 0 string NG\0\001
  779. # only value 0x100 found at offset 2
  780. >2 ulelong 0x00000100 Norton Guide
  781. # Title[40]
  782. >>8 string >\0 "%-.40s"
  783. #>>6 uleshort x \b, MenuCount=%u
  784. # szCredits[5][66]
  785. >>48 string >\0 \b, %-.66s
  786. >>114 string >\0 %-.66s
  787. # 4DOS help (.HLP) files added by Joerg Jenderek from source TPHELP.PAS
  788. # of http://www.4dos.info/
  789. # pointer,HelpID[8]=4DHnnnmm
  790. 0 ulelong 0x48443408 4DOS help file
  791. >4 string x \b, version %-4.4s
  792. # old binary Microsoft (.HLP) files added by Joerg Jenderek from http://file-extension.net/seeker/file_extension_hlp
  793. 0 ulequad 0x3a000000024e4c MS Advisor help file
  794. # HtmlHelp files (.chm)
  795. 0 string/b ITSF\003\000\000\000\x60\000\000\000 MS Windows HtmlHelp Data
  796. # GFA-BASIC (Wolfram Kleff)
  797. 2 string/b GFA-BASIC3 GFA-BASIC 3 data
  798. #------------------------------------------------------------------------------
  799. # From Stuart Caie <kyzer@4u.net> (developer of cabextract)
  800. # Microsoft Cabinet files
  801. 0 string/b MSCF\0\0\0\0 Microsoft Cabinet archive data
  802. !:mime application/vnd.ms-cab-compressed
  803. >8 lelong x \b, %u bytes
  804. >28 leshort 1 \b, 1 file
  805. >28 leshort >1 \b, %u files
  806. # InstallShield Cabinet files
  807. 0 string/b ISc( InstallShield Cabinet archive data
  808. >5 byte&0xf0 =0x60 version 6,
  809. >5 byte&0xf0 !0x60 version 4/5,
  810. >(12.l+40) lelong x %u files
  811. # Windows CE package files
  812. 0 string/b MSCE\0\0\0\0 Microsoft WinCE install header
  813. >20 lelong 0 \b, architecture-independent
  814. >20 lelong 103 \b, Hitachi SH3
  815. >20 lelong 104 \b, Hitachi SH4
  816. >20 lelong 0xA11 \b, StrongARM
  817. >20 lelong 4000 \b, MIPS R4000
  818. >20 lelong 10003 \b, Hitachi SH3
  819. >20 lelong 10004 \b, Hitachi SH3E
  820. >20 lelong 10005 \b, Hitachi SH4
  821. >20 lelong 70001 \b, ARM 7TDMI
  822. >52 leshort 1 \b, 1 file
  823. >52 leshort >1 \b, %u files
  824. >56 leshort 1 \b, 1 registry entry
  825. >56 leshort >1 \b, %u registry entries
  826. # Windows Enhanced Metafile (EMF)
  827. # See msdn.microsoft.com/archive/en-us/dnargdi/html/msdn_enhmeta.asp
  828. # for further information.
  829. 0 ulelong 1
  830. >40 string \ EMF Windows Enhanced Metafile (EMF) image data
  831. >>44 ulelong x version 0x%x
  832. # from http://filext.com by Derek M Jones <derek@knosof.co.uk>
  833. # False positive with PPT (also currently this string is too long)
  834. #0 string/b \xD0\xCF\x11\xE0\xA1\xB1\x1A\xE1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x3E\x00\x03\x00\xFE\xFF\x09\x00\x06 Microsoft Installer
  835. 0 string/b \320\317\021\340\241\261\032\341 Microsoft Office Document
  836. #>48 byte 0x1B Excel Document
  837. #!:mime application/vnd.ms-excel
  838. >546 string bjbj Microsoft Word Document
  839. !:mime application/msword
  840. >546 string jbjb Microsoft Word Document
  841. !:mime application/msword
  842. 0 string/b \224\246\056 Microsoft Word Document
  843. !:mime application/msword
  844. 512 string R\0o\0o\0t\0\ \0E\0n\0t\0r\0y Microsoft Word Document
  845. !:mime application/msword
  846. # From: "Nelson A. de Oliveira" <naoliv@gmail.com>
  847. # Magic type for Dell's BIOS .hdr files
  848. # Dell's .hdr
  849. 0 string/b $RBU
  850. >23 string Dell %s system BIOS
  851. >5 byte 2
  852. >>48 byte x version %d.
  853. >>49 byte x \b%d.
  854. >>50 byte x \b%d
  855. >5 byte <2
  856. >>48 string x version %.3s
  857. # Type: Microsoft DirectDraw Surface
  858. # URL: http://msdn.microsoft.com/library/default.asp?url=/library/en-us/directx9_c/directx/graphics/reference/DDSFileReference/ddsfileformat.asp
  859. # From: Morten Hustveit <morten@debian.org>
  860. 0 string/b DDS\040\174\000\000\000 Microsoft DirectDraw Surface (DDS),
  861. >16 lelong >0 %d x
  862. >12 lelong >0 %d,
  863. >84 string x %.4s
  864. # Type: Microsoft Document Imaging Format (.mdi)
  865. # URL: http://en.wikipedia.org/wiki/Microsoft_Document_Imaging_Format
  866. # From: Daniele Sempione <scrows@oziosi.org>
  867. 0 short 0x5045 Microsoft Document Imaging Format
  868. # MS eBook format (.lit)
  869. 0 string/b ITOLITLS Microsoft Reader eBook Data
  870. >8 lelong x \b, version %u
  871. !:mime application/x-ms-reader
  872. # Windows CE Binary Image Data Format
  873. # From: Dr. Jesus <j@hug.gs>
  874. 0 string/b B000FF\n Windows Embedded CE binary image
  875. # Windows Imaging (WIM) Image
  876. 0 string/b MSWIM\000\000\000 Windows imaging (WIM) image
  877. 0 string/b WLPWM\000\000\000 Windows imaging (WIM) image, wimlib pipable format
  878. # The second byte of these signatures is a file version; I don't know what,
  879. # if anything, produced files with version numbers 0-2.
  880. # From: John Elliott <johne@seasip.demon.co.uk>
  881. 0 string \xfc\x03\x00 Mallard BASIC program data (v1.11)
  882. 0 string \xfc\x04\x00 Mallard BASIC program data (v1.29+)
  883. 0 string \xfc\x03\x01 Mallard BASIC protected program data (v1.11)
  884. 0 string \xfc\x04\x01 Mallard BASIC protected program data (v1.29+)
  885. 0 string MIOPEN Mallard BASIC Jetsam data
  886. 0 string Jetsam0 Mallard BASIC Jetsam index data