Unknown type picture file (.pic)
.pic file signature | image/x-pict
Unknown type picture file
Magic Bytes
Offset 522
00 11 02 FF 0C 00
Sources: Apache Tika
All Known Signatures
2 signature variants are documented for .pic files across multiple sources.
| Hex Signature | Offset | Sources |
|---|---|---|
| 00 11 02 FF 0C 00 | 522 | Apache Tika |
| 01 00 00 00 01 | 0 | Gary Kessler |
Extension
.pic
MIME Type
image/x-pict
Byte Offset
522
Risk Level
Safe
Validation Code
How to validate .pic files in Python
def is_pic(file_path: str) -> bool:
"""Check if file is a valid PIC by magic bytes."""
signature = bytes([0x00, 0x11, 0x02, 0xFF, 0x0C, 0x00])
with open(file_path, "rb") as f:
return f.read(6) == signature
How to validate .pic files in Node.js
function isPIC(buffer: Buffer): boolean {
const signature = Buffer.from([0x00, 0x11, 0x02, 0xFF, 0x0C, 0x00]);
return buffer.subarray(0, 6).equals(signature);
}
How to validate .pic files in Go
func IsPIC(data []byte) bool {
signature := []byte{0x00, 0x11, 0x02, 0xFF, 0x0C, 0x00}
if len(data) < 6 {
return false
}
return bytes.Equal(data[:6], signature)
}
API Endpoint
/api/v1/pic
curl https://filesignature.org/api/v1/pic
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .pic file?
A .pic file is a Unknown type picture file file. Unknown type picture file
What are the magic bytes for .pic files?
The magic bytes for Unknown type picture file files are 00 11 02 FF 0C 00 at byte offset 522. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .pic file?
To validate a .pic file, read the first bytes of the file and compare them against the known magic bytes (00 11 02 FF 0C 00) at offset 522. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .pic files?
The primary MIME type for .pic files is image/x-pict.
Is it safe to open .pic files?
Unknown type picture file (.pic) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.