msdos 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542
  1. #------------------------------------------------------------------------------
  2. # msdos: file(1) magic for MS-DOS files
  3. #
  4. # .BAT files (Daniel Quinlan, quinlan@yggdrasil.com)
  5. 0 string/c @echo\ off MS-DOS batch file text
  6. # OS/2 batch files are REXX. the second regex is a bit generic, oh well
  7. # the matched commands seem to be common in REXX and uncommon elsewhere
  8. 100 regex/c =^\\s*call\s+rxfuncadd.*sysloadfu OS/2 REXX batch file text
  9. 100 regex/c =^\\s*say\ ['"] OS/2 REXX batch file text
  10. 0 leshort 0x14c MS Windows COFF Intel 80386 object file
  11. #>4 ledate x stamp %s
  12. 0 leshort 0x166 MS Windows COFF MIPS R4000 object file
  13. #>4 ledate x stamp %s
  14. 0 leshort 0x184 MS Windows COFF Alpha object file
  15. #>4 ledate x stamp %s
  16. 0 leshort 0x268 MS Windows COFF Motorola 68000 object file
  17. #>4 ledate x stamp %s
  18. 0 leshort 0x1f0 MS Windows COFF PowerPC object file
  19. #>4 ledate x stamp %s
  20. 0 leshort 0x290 MS Windows COFF PA-RISC object file
  21. #>4 ledate x stamp %s
  22. # XXX - according to Microsoft's spec, at an offset of 0x3c in a
  23. # PE-format executable is the offset in the file of the PE header;
  24. # unfortunately, that's a little-endian offset, and there's no way
  25. # to specify an indirect offset with a specified byte order.
  26. # So, for now, we assume the standard MS-DOS stub, which puts the
  27. # PE header at 0x80 = 128.
  28. #
  29. # Required OS version and subsystem version were 4.0 on some NT 3.51
  30. # executables built with Visual C++ 4.0, so it's not clear that
  31. # they're interesting. The user version was 0.0, but there's
  32. # probably some linker directive to set it. The linker version was
  33. # 3.0, except for one ".exe" which had it as 4.20 (same damn linker!).
  34. #
  35. # many of the compressed formats were extraced from IDARC 1.23 source code
  36. #
  37. 0 string MZ
  38. >0 string MZ\0\0\0\0\0\0\0\0\0\0PE\0\0 PE executable for MS Windows
  39. >>&18 leshort&0x2000 >0 (DLL)
  40. >>&88 leshort 0 (unknown subsystem)
  41. >>&88 leshort 1 (native)
  42. >>&88 leshort 2 (GUI)
  43. >>&88 leshort 3 (console)
  44. >>&88 leshort 7 (POSIX)
  45. >>&0 leshort 0x0 unknown processor
  46. >>&0 leshort 0x14c Intel 80386
  47. >>&0 leshort 0x166 MIPS R4000
  48. >>&0 leshort 0x184 Alpha
  49. >>&0 leshort 0x268 Motorola 68000
  50. >>&0 leshort 0x1f0 PowerPC
  51. >>&0 leshort 0x290 PA-RISC
  52. >>&18 leshort&0x0100 >0 32-bit
  53. >>&18 leshort&0x1000 >0 system file
  54. >>&0xf4 search/0x140 \x0\x40\x1\x0
  55. >>>(&0.l+(4)) string MSCF \b, WinHKI CAB self-extracting archive
  56. >0x18 leshort >0x3f
  57. >>(0x3c.l) string PE\0\0 PE executable
  58. # hooray, there's a DOS extender using the PE format, with a valid PE
  59. # executable inside (which just prints a message and exits if run in win)
  60. >>>(8.s*16) string 32STUB for MS-DOS, 32rtm DOS extender
  61. >>>(8.s*16) string !32STUB for MS Windows
  62. >>>>(0x3c.l+22) leshort&0x2000 >0 (DLL)
  63. >>>>(0x3c.l+92) leshort 0 (unknown subsystem)
  64. >>>>(0x3c.l+92) leshort 1 (native)
  65. >>>>(0x3c.l+92) leshort 2 (GUI)
  66. >>>>(0x3c.l+92) leshort 3 (console)
  67. >>>>(0x3c.l+92) leshort 7 (POSIX)
  68. >>>>(0x3c.l+4) leshort 0x0 unknown processor
  69. >>>>(0x3c.l+4) leshort 0x14c Intel 80386
  70. >>>>(0x3c.l+4) leshort 0x166 MIPS R4000
  71. >>>>(0x3c.l+4) leshort 0x184 Alpha
  72. >>>>(0x3c.l+4) leshort 0x268 Motorola 68000
  73. >>>>(0x3c.l+4) leshort 0x1f0 PowerPC
  74. >>>>(0x3c.l+4) leshort 0x290 PA-RISC
  75. >>>>(0x3c.l+22) leshort&0x0100 >0 32-bit
  76. >>>>(0x3c.l+22) leshort&0x1000 >0 system file
  77. >>>>(0x3c.l+0xf8) string UPX0 \b, UPX compressed
  78. >>>>(0x3c.l+0xf8) search/0x140 PEC2 \b, PECompact2 compressed
  79. >>>>(0x3c.l+0xf8) search/0x140 UPX2
  80. >>>>>(&0x10.l+(-4)) string PK\3\4 \b, ZIP self-extracting archive (Info-Zip)
  81. >>>>(0x3c.l+0xf8) search/0x140 .idata
  82. >>>>>(&0xe.l+(-4)) string PK\3\4 \b, ZIP self-extracting archive (Info-Zip)
  83. >>>>>(&0xe.l+(-4)) string ZZ0 \b, ZZip self-extracting archive
  84. >>>>>(&0xe.l+(-4)) string ZZ1 \b, ZZip self-extracting archive
  85. >>>>(0x3c.l+0xf8) search/0x140 .rsrc
  86. >>>>>(&0x0f.l+(-4)) string a\\\4\5 \b, WinHKI self-extracting archive
  87. >>>>>(&0x0f.l+(-4)) string Rar! \b, RAR self-extracting archive
  88. >>>>>(&0x0f.l+(-4)) search/0x3000 MSCF \b, InstallShield self-extracting archive
  89. >>>>>(&0x0f.l+(-4)) search/32 Nullsoft \b, Nullsoft Installer self-extracting archive
  90. >>>>(0x3c.l+0xf8) search/0x140 .data
  91. >>>>>(&0x0f.l) string WEXTRACT \b, MS CAB-Installer self-extracting archive
  92. >>>>(0x3c.l+0xf8) search/0x140 .petite\0 \b, Petite compressed
  93. >>>>>(0x3c.l+0xf7) byte x
  94. >>>>>>(&0x104.l+(-4)) string =!sfx! \b, ACE self-extracting archive
  95. >>>>(0x3c.l+0xf8) search/0x140 .WISE \b, WISE installer self-extracting archive
  96. >>>>(0x3c.l+0xf8) search/0x140 .dz\0\0\0 \b, Dzip self-extracting archive
  97. >>>>(0x3c.l+0xf8) search/0x140 .reloc
  98. >>>>>(&0xe.l+(-4)) search/0x180 PK\3\4 \b, ZIP self-extracting archive (WinZip)
  99. >>>>&(0x3c.l+0xf8) search/0x100 _winzip_ \b, ZIP self-extracting archive (WinZip)
  100. >>>>&(0x3c.l+0xf8) search/0x100 SharedD \b, Microsoft Installer self-extracting archive
  101. >>>>0x30 string Inno \b, InnoSetup self-extracting archive
  102. >>(0x3c.l) string NE NE executable
  103. >>>(0x3c.l+0x36) byte 0 (unknown OS)
  104. >>>(0x3c.l+0x36) byte 1 for OS/2 1.x
  105. >>>(0x3c.l+0x36) byte 2 for MS Windows 3.x
  106. >>>(0x3c.l+0x36) byte 3 for MS-DOS
  107. >>>(0x3c.l+0x36) byte >3 (unknown OS)
  108. >>>(0x3c.l+0x36) byte 0x81 for MS-DOS, Phar Lap DOS extender
  109. >>>(0x3c.l+0x0c) leshort&0x8003 0x8002 (DLL)
  110. >>>(0x3c.l+0x0c) leshort&0x8003 0x8001 (driver)
  111. >>>&(&0x24.s-1) string ARJSFX \b, ARJ self-extracting archive
  112. >>>(0x3c.l+0x70) search/0x80 WinZip(R)\ Self-Extractor \b, ZIP self-extracting archive (WinZip)
  113. >>(0x3c.l) string LX\0\0 LX executable
  114. >>>(0x3c.l+0x0a) leshort <1 (unknown OS)
  115. >>>(0x3c.l+0x0a) leshort 1 for OS/2
  116. >>>(0x3c.l+0x0a) leshort 2 for MS Windows
  117. >>>(0x3c.l+0x0a) leshort 3 for DOS
  118. >>>(0x3c.l+0x0a) leshort >3 (unknown OS)
  119. >>>(0x3c.l+0x10) lelong&0x28000 =0x8000 (DLL)
  120. >>>(0x3c.l+0x10) lelong&0x20000 >0 (device driver)
  121. >>>(0x3c.l+0x10) lelong&0x300 0x300 (GUI)
  122. >>>(0x3c.l+0x10) lelong&0x28300 <0x300 (console)
  123. >>>(0x3c.l+0x08) leshort 1 i80286
  124. >>>(0x3c.l+0x08) leshort 2 i80386
  125. >>>(0x3c.l+0x08) leshort 3 i80486
  126. >>>(8.s*16) string emx \b, emx
  127. >>>>&1 string x %s
  128. >>>&(&0x54.l-3) string arjsfx \b, ARJ self-extracting archive
  129. # MS Windows system file, supposedly a collection of LE executables
  130. >>(0x3c.l) string W3 W3 executable for MS Windows
  131. >>(0x3c.l) string LE\0\0 LE executable
  132. >>>(0x3c.l+0x0a) leshort 1
  133. # some DOS extenders use LE files with OS/2 header
  134. >>>>0x240 search/0x100 DOS/4G for MS-DOS, DOS4GW DOS extender
  135. >>>>0x240 search/0x200 WATCOM\ C/C++ for MS-DOS, DOS4GW DOS extender
  136. >>>>0x440 search/0x100 CauseWay\ DOS\ Extender for MS-DOS, CauseWay DOS extender
  137. >>>>0x40 search/0x40 PMODE/W for MS-DOS, PMODE/W DOS extender
  138. >>>>0x40 search/0x40 STUB/32A for MS-DOS, DOS/32A DOS extender (stub)
  139. >>>>0x40 search/0x80 STUB/32C for MS-DOS, DOS/32A DOS extender (configurable stub)
  140. >>>>0x40 search/0x80 DOS/32A for MS-DOS, DOS/32A DOS extender (embedded)
  141. # this is a wild guess; hopefully it is a specific signature
  142. >>>>&0x24 lelong <0x50
  143. >>>>>(&0x4c.l) string \xfc\xb8WATCOM
  144. >>>>>>&0 search/8 3\xdbf\xb9 \b, 32Lite compressed
  145. # another wild guess: if real OS/2 LE executables exist, they probably have higher start EIP
  146. #>>>>(0x3c.l+0x1c) lelong >0x10000 for OS/2
  147. # fails with DOS-Extenders.
  148. >>>(0x3c.l+0x0a) leshort 2 for MS Windows
  149. >>>(0x3c.l+0x0a) leshort 3 for MS-DOS
  150. >>>(0x3c.l+0x0a) leshort 4 for MS Windows (VxD)
  151. >>>(&0x7c.l+0x26) string UPX \b, UPX compressed
  152. >>>&(&0x54.l-3) string UNACE \b, ACE self-extracting archive
  153. # looks like ASCII, probably some embedded copyright message.
  154. # and definitely not NE/LE/LX/PE
  155. >>0x3c lelong >0x20000000
  156. >>>(4.s*512) leshort !0x014c MZ executable for MS-DOS
  157. # header data too small for extended executable
  158. >2 long !0
  159. >>0x18 leshort <0x40
  160. >>>(4.s*512) leshort !0x014c
  161. >>>>&(2.s-514) string !LE
  162. >>>>>&-2 string !BW MZ executable for MS-DOS
  163. >>>>&(2.s-514) string LE LE executable
  164. >>>>>0x240 search/0x100 DOS/4G for MS-DOS, DOS4GW DOS extender
  165. # educated guess since indirection is still not capable enough for complex offset
  166. # calculations (next embedded executable would be at &(&2*512+&0-2)
  167. # I suspect there are only LE executables in these multi-exe files
  168. >>>>&(2.s-514) string BW
  169. >>>>>0x240 search/0x100 DOS/4G LE executable for MS-DOS, DOS4GW DOS extender (embedded)
  170. >>>>>0x240 search/0x100 !DOS/4G BW executable collection for MS-DOS
  171. # This sequence skips to the first COFF segment, usually .text
  172. >(4.s*512) leshort 0x014c COFF executable
  173. >>(8.s*16) string go32stub for MS-DOS, DJGPP go32 DOS extender
  174. >>(8.s*16) string emx
  175. >>>&1 string x for DOS, Win or OS/2, emx %s
  176. >>&(&0x42.l-3) byte x
  177. >>>&0x26 string UPX \b, UPX compressed
  178. # and yet another guess: small .text, and after large .data is unusal, could be 32lite
  179. >>&0x2c search/0xa0 .text
  180. >>>&0x0b lelong <0x2000
  181. >>>>&0 lelong >0x6000 \b, 32lite compressed
  182. >(8.s*16) string $WdX \b, WDos/X DOS extender
  183. # .EXE formats (Greg Roelofs, newt@uchicago.edu)
  184. #
  185. >0x35 string \x8e\xc0\xb9\x08\x00\xf3\xa5\x4a\x75\xeb\x8e\xc3\x8e\xd8\x33\xff\xbe\x30\x00\x05 \b, aPack compressed
  186. >0xe7 string LH/2\ Self-Extract \b, %s
  187. >0x1c string diet \b, diet compressed
  188. >0x1c string LZ09 \b, LZEXE v0.90 compressed
  189. >0x1c string LZ91 \b, LZEXE v0.91 compressed
  190. >0x1c string tz \b, TinyProg compressed
  191. >0x1e string PKLITE \b, %s compressed
  192. >0x64 string W\ Collis\0\0 \b, Compack compressed
  193. >0x24 string LHa's\ SFX \b, LHa self-extracting archive
  194. >0x24 string LHA's\ SFX \b, LHa self-extracting archive
  195. >0x24 string \ $ARX \b, ARX self-extracting archive
  196. >0x24 string \ $LHarc \b, LHarc self-extracting archive
  197. >0x20 string SFX\ by\ LARC \b, LARC self-extracting archive
  198. >1638 string -lh5- \b, LHa self-extracting archive v2.13S
  199. >0x17888 string Rar! \b, RAR self-extracting archive
  200. >0x40 string aPKG \b, aPackage self-extracting archive
  201. >32 string AIN
  202. >>35 string 2 \b, AIN 2.x compressed
  203. >>35 string <2 \b, AIN 1.x compressed
  204. >>35 string >2 \b, AIN 1.x compressed
  205. >28 string UC2X \b, UCEXE compressed
  206. >28 string WWP\ \b, WWPACK compressed
  207. # skip to the end of the exe
  208. >(4.s*512) long x
  209. >>&(2.s-517) byte x
  210. >>>&0 string PK\3\4 \b, ZIP self-extracting archive
  211. >>>&0 string Rar! \b, RAR self-extracting archive
  212. >>>&0 string =!\x11 \b, AIN 2.x self-extracting archive
  213. >>>&0 string =!\x12 \b, AIN 2.x self-extracting archive
  214. >>>&0 string =!\x17 \b, AIN 1.x self-extracting archive
  215. >>>&0 string =!\x18 \b, AIN 1.x self-extracting archive
  216. >>>&7 search/400 **ACE** \b, ACE self-extracting archive
  217. >>>&0 search/0x480 UC2SFX\ Header \b, UC2 self-extracting archive
  218. >0x1c string RJSX \b, ARJ self-extracting archive
  219. # winarj stores a message in the stub instead of the sig in the MZ header
  220. >0x20 search/0xe0 aRJsfX \b, ARJ self-extracting archive
  221. # a few unknown ZIP sfxes, no idea if they are needed or if they are
  222. # already captured by the generic patterns above
  223. >122 string Windows\ self-extracting\ ZIP \b, ZIP self-extracting archive
  224. >(8.s*16) search/0x20 PKSFX \b, ZIP self-extracting archive (PKZIP)
  225. # TODO: how to add this? >FileSize-34 string Windows\ Self-Installing\ Executable \b, ZIP self-extracting archive
  226. #
  227. # TELVOX Teleinformatica CODEC self-extractor for OS/2:
  228. >49801 string \x79\xff\x80\xff\x76\xff \b, CODEC archive v3.21
  229. >>49824 leshort =1 \b, 1 file
  230. >>49824 leshort >1 \b, %u files
  231. # .COM formats (Daniel Quinlan, quinlan@yggdrasil.com)
  232. # Uncommenting only the first two lines will cover about 2/3 of COM files,
  233. # but it isn't feasible to match all COM files since there must be at least
  234. # two dozen different one-byte "magics".
  235. 0 byte 0xe9 MS-DOS executable (COM)
  236. >6 string SFX\ of\ LHarc (%s)
  237. 0 byte 0x8c MS-DOS executable (COM)
  238. # 0xeb conflicts with "sequent" magic
  239. 0 byte 0xeb MS-DOS executable (COM)
  240. >4 string \ $ARX \b, ARX self-extracting archive
  241. >4 string \ $LHarc \b, LHarc self-extracting archive
  242. >0x20e string SFX\ by\ LARC \b, LARC self-extracting archive
  243. 0 byte 0xb8 COM executable for MS-DOS
  244. # many compressed/converted COMs start with a copy loop instead of a jump
  245. 0x6 search/0xa \xfc\x57\xf3\xa5\xc3 COM executable for MS-DOS
  246. 0x6 search/0xa \xfc\x57\xf3\xa4\xc3 COM executable for MS-DOS
  247. >0x18 search/0x10 \x50\xa4\xff\xd5\x73 \b, aPack compressed
  248. 0x3c string W\ Collis\0\0 COM executable for MS-DOS, Compack compressed
  249. # FIXME: missing diet .com compression
  250. # miscellaneous formats
  251. 0 string LZ MS-DOS executable (built-in)
  252. #0 byte 0xf0 MS-DOS program library data
  253. #
  254. #
  255. # Windows Registry files.
  256. #
  257. 0 string regf Windows NT registry file
  258. 0 string CREG Windows 95 registry file
  259. # AAF files:
  260. # <stuartc@rd.bbc.co.uk> Stuart Cunningham
  261. 0 string \320\317\021\340\241\261\032\341AAFB\015\000OM\006\016\053\064\001\001\001\377 AAF legacy file using MS Structured Storage
  262. >30 byte 9 (512B sectors)
  263. >30 byte 12 (4kB sectors)
  264. 0 string \320\317\021\340\241\261\032\341\001\002\001\015\000\002\000\000\006\016\053\064\003\002\001\001 AAF file using MS Structured Storage
  265. >30 byte 9 (512B sectors)
  266. >30 byte 12 (4kB sectors)
  267. # Popular applications
  268. 2080 string Microsoft\ Word\ 6.0\ Document %s
  269. 2080 string Documento\ Microsoft\ Word\ 6 Spanish Microsoft Word 6 document data
  270. # Pawel Wiecek <coven@i17linuxb.ists.pwr.wroc.pl> (for polish Word)
  271. 2112 string MSWordDoc Microsoft Word document data
  272. #
  273. 0 belong 0x31be0000 Microsoft Word Document
  274. #
  275. 0 string PO^Q` Microsoft Word 6.0 Document
  276. #
  277. 0 string \376\067\0\043 Microsoft Office Document
  278. 0 string \320\317\021\340\241\261\032\341 Microsoft Office Document
  279. 0 string \333\245-\0\0\0 Microsoft Office Document
  280. #
  281. 2080 string Microsoft\ Excel\ 5.0\ Worksheet %s
  282. 2080 string Foglio\ di\ lavoro\ Microsoft\ Exce %s
  283. #
  284. # Pawel Wiecek <coven@i17linuxb.ists.pwr.wroc.pl> (for polish Excel)
  285. 2114 string Biff5 Microsoft Excel 5.0 Worksheet
  286. # Italian MS-Excel
  287. 2121 string Biff5 Microsoft Excel 5.0 Worksheet
  288. 0 string \x09\x04\x06\x00\x00\x00\x10\x00 Microsoft Excel Worksheet
  289. #
  290. 0 belong 0x00001a00 Lotus 1-2-3
  291. >4 belong 0x00100400 wk3 document data
  292. >4 belong 0x02100400 wk4 document data
  293. >4 belong 0x07800100 fm3 or fmb document data
  294. >4 belong 0x07800000 fm3 or fmb document data
  295. #
  296. 0 belong 0x00000200 Lotus 1-2-3
  297. >4 belong 0x06040600 wk1 document data
  298. >4 belong 0x06800200 fmt document data
  299. # Help files
  300. 0 string ?_\3\0 MS Windows Help Data
  301. # DeIsL1.isu what this is I don't know
  302. 0 string \161\250\000\000\001\002 DeIsL1.isu whatever that is
  303. # Winamp .avs
  304. #0 string Nullsoft\ AVS\ Preset\ \060\056\061\032 A plug in for Winamp ms-windows Freeware media player
  305. 0 string Nullsoft\ AVS\ Preset\ Winamp plug in
  306. # Hyper terminal:
  307. 0 string HyperTerminal\ hyperterm
  308. >15 string 1.0\ --\ HyperTerminal\ data\ file MS-windows Hyperterminal
  309. # Windows Metafont .WMF
  310. 0 string \327\315\306\232\000\000\000\000\000\000 ms-windows metafont .wmf
  311. #tz3 files whatever that is (MS Works files)
  312. 0 string \003\001\001\004\070\001\000\000 tz3 ms-works file
  313. 0 string \003\002\001\004\070\001\000\000 tz3 ms-works file
  314. 0 string \003\003\001\004\070\001\000\000 tz3 ms-works file
  315. # PGP sig files .sig
  316. #0 string \211\000\077\003\005\000\063\237\127 065 to \027\266\151\064\005\045\101\233\021\002 PGP sig
  317. 0 string \211\000\077\003\005\000\063\237\127\065\027\266\151\064\005\045\101\233\021\002 PGP sig
  318. 0 string \211\000\077\003\005\000\063\237\127\066\027\266\151\064\005\045\101\233\021\002 PGP sig
  319. 0 string \211\000\077\003\005\000\063\237\127\067\027\266\151\064\005\045\101\233\021\002 PGP sig
  320. 0 string \211\000\077\003\005\000\063\237\127\070\027\266\151\064\005\045\101\233\021\002 PGP sig
  321. 0 string \211\000\077\003\005\000\063\237\127\071\027\266\151\064\005\045\101\233\021\002 PGP sig
  322. 0 string \211\000\225\003\005\000\062\122\207\304\100\345\042 PGP sig
  323. # windows zips files .dmf
  324. 0 string MDIF\032\000\010\000\000\000\372\046\100\175\001\000\001\036\001\000 MS Windows special zipped file
  325. # Windows help file FTG FTS
  326. 0 string \164\146\115\122\012\000\000\000\001\000\000\000 MS Windows help cache
  327. # grp old windows 3.1 group files
  328. 0 string \120\115\103\103 MS Windows 3.1 group files
  329. # lnk files windows symlinks
  330. 0 string \114\000\000\000\001\024\002\000\000\000\000\000\300\000\000\000\000\000\000\106 MS Windows shortcut
  331. #ico files
  332. 0 string \102\101\050\000\000\000\056\000\000\000\000\000\000\000 Icon for MS Windows
  333. # Windows icons (Ian Springer <ips@fpk.hp.com>)
  334. 0 string \000\000\001\000 MS Windows icon resource
  335. >4 byte 1 - 1 icon
  336. >4 byte >1 - %d icons
  337. >>6 byte >0 \b, %dx
  338. >>>7 byte >0 \b%d
  339. >>8 byte 0 \b, 256-colors
  340. >>8 byte >0 \b, %d-colors
  341. # .chr files
  342. 0 string PK\010\010BGI Borland font
  343. >4 string >\0 %s
  344. # then there is a copyright notice
  345. # .bgi files
  346. 0 string pk\010\010BGI Borland device
  347. >4 string >\0 %s
  348. # then there is a copyright notice
  349. # recycled/info the windows trash bin index
  350. 9 string \000\000\000\030\001\000\000\000 MS Windows recycled bin info
  351. ##### put in Either Magic/font or Magic/news
  352. # Acroread or something files wrongly identified as G3 .pfm
  353. # these have the form \000 \001 any? \002 \000 \000
  354. # or \000 \001 any? \022 \000 \000
  355. #0 string \000\001 pfm?
  356. #>3 string \022\000\000Copyright\ yes
  357. #>3 string \002\000\000Copyright\ yes
  358. #>3 string >\0 oops, not a font file. Cancel that.
  359. #it clashes with ttf files so put it lower down.
  360. # From Doug Lee via a FreeBSD pr
  361. 9 string GERBILDOC First Choice document
  362. 9 string GERBILDB First Choice database
  363. 9 string GERBILCLIP First Choice database
  364. 0 string GERBIL First Choice device file
  365. 9 string RABBITGRAPH RabbitGraph file
  366. 0 string DCU1 Borland Delphi .DCU file
  367. 0 string =!<spell> MKS Spell hash list (old format)
  368. 0 string =!<spell2> MKS Spell hash list
  369. # Too simple - MPi
  370. #0 string AH Halo(TM) bitmapped font file
  371. 0 lelong 0x08086b70 TurboC BGI file
  372. 0 lelong 0x08084b50 TurboC Font file
  373. # WARNING: below line conflicts with Infocom game data Z-machine 3
  374. 0 byte 0x03 DBase 3 data file
  375. >0x04 lelong 0 (no records)
  376. >0x04 lelong >0 (%ld records)
  377. 0 byte 0x83 DBase 3 data file with memo(s)
  378. >0x04 lelong 0 (no records)
  379. >0x04 lelong >0 (%ld records)
  380. 0 leshort 0x0006 DBase 3 index file
  381. 0 string PMCC Windows 3.x .GRP file
  382. 1 string RDC-meg MegaDots
  383. >8 byte >0x2F version %c
  384. >9 byte >0x2F \b.%c file
  385. 0 lelong 0x4C
  386. >4 lelong 0x00021401 Windows shortcut file
  387. # DOS EPS Binary File Header
  388. # From: Ed Sznyter <ews@Black.Market.NET>
  389. 0 belong 0xC5D0D3C6 DOS EPS Binary File
  390. >4 long >0 Postscript starts at byte %d
  391. >>8 long >0 length %d
  392. >>>12 long >0 Metafile starts at byte %d
  393. >>>>16 long >0 length %d
  394. >>>20 long >0 TIFF starts at byte %d
  395. >>>>24 long >0 length %d
  396. # TNEF magic From "Joomy" <joomy@se-ed.net>
  397. 0 leshort 0x223e9f78 TNEF
  398. # HtmlHelp files (.chm)
  399. 0 string ITSF\003\000\000\000\x60\000\000\000\001\000\000\000 MS Windows HtmlHelp Data
  400. # GFA-BASIC (Wolfram Kleff)
  401. 2 string GFA-BASIC3 GFA-BASIC 3 data
  402. #------------------------------------------------------------------------------
  403. # From Stuart Caie <kyzer@4u.net> (developer of cabextract)
  404. # Microsoft Cabinet files
  405. 0 string MSCF\0\0\0\0 Microsoft Cabinet archive data
  406. >8 lelong x \b, %u bytes
  407. >28 leshort 1 \b, 1 file
  408. >28 leshort >1 \b, %u files
  409. # InstallShield Cabinet files
  410. 0 string ISc( InstallShield Cabinet archive data
  411. >5 byte&0xf0 =0x60 version 6,
  412. >5 byte&0xf0 !0x60 version 4/5,
  413. >(12.l+40) lelong x %u files
  414. # Windows CE package files
  415. 0 string MSCE\0\0\0\0 Microsoft WinCE install header
  416. >20 lelong 0 \b, architecture-independent
  417. >20 lelong 103 \b, Hitachi SH3
  418. >20 lelong 104 \b, Hitachi SH4
  419. >20 lelong 0xA11 \b, StrongARM
  420. >20 lelong 4000 \b, MIPS R4000
  421. >20 lelong 10003 \b, Hitachi SH3
  422. >20 lelong 10004 \b, Hitachi SH3E
  423. >20 lelong 10005 \b, Hitachi SH4
  424. >20 lelong 70001 \b, ARM 7TDMI
  425. >52 leshort 1 \b, 1 file
  426. >52 leshort >1 \b, %u files
  427. >56 leshort 1 \b, 1 registry entry
  428. >56 leshort >1 \b, %u registry entries
  429. # Outlook Personal Folders
  430. 0 lelong 0x4E444221 Microsoft Outlook binary email folder
  431. # From: Dirk Jagdmann <doj@cubic.org>
  432. 0 lelong 0x00035f3f Windows 3.x help file
  433. # Christophe Monniez
  434. 0 string Client\ UrlCache\ MMF Microsoft Internet Explorer Cache File
  435. >20 string >\0 Version %s
  436. 0 string \xCF\xAD\x12\xFE Microsoft Outlook Express DBX File
  437. >4 byte =0xC5 Message database
  438. >4 byte =0xC6 Folder database
  439. >4 byte =0xC7 Accounts informations
  440. >4 byte =0x30 Offline database
  441. # Windows Enhanced Metafile (EMF)
  442. # See msdn.microsoft.com/archive/en-us/dnargdi/html/msdn_enhmeta.asp
  443. # for further information. Note that "0 lelong 1" should be true i.e.
  444. # the first double word in the file should be 1. With the extended
  445. # syntax available by some file commands you could write:
  446. # 0 lelong 1
  447. # &40 ulelong 0x464D4520 Windows Enhanced Metafile (EMF) image data
  448. 40 ulelong 0x464D4520 Windows Enhanced Metafile (EMF) image data
  449. >44 ulelong x version 0x%x.
  450. # If the description has a length greater than zero, it exists and is
  451. # found at offset (*64).
  452. >64 ulelong >0 Description available at offset 0x%x
  453. >>60 ulelong >0 (length 0x%x)
  454. # Note it would be better to print out the description, which is found
  455. # as below. Unfortunately the following only prints out the first couple
  456. # of characters instead of all the "description length"
  457. # number of characters -- indicated by the ulelong at offset 60.
  458. >>(64.l) lestring16 >0 Description: %15.15s
  459. # From: Alex Beregszaszi <alex@fsn.hu>
  460. 0 string COWD VMWare3 disk image
  461. >12 belong x %d bytes
  462. 0 string VMDK VMware4 disk image
  463. 0 belong 0x514649fb QEMU Copy-On-Write disk image
  464. >4 belong x version %d,
  465. >24 belong x size %d +
  466. >28 belong x %d
  467. 0 string QEVM QEMU's suspend to disk image
  468. 0 string Bochs\ Virtual\ HD\ Image Bochs disk image,
  469. >32 string x type %s,
  470. >48 string x subtype %s
  471. 0 lelong 0x02468ace Bochs Sparse disk image