Quicken data file (.qel)
.qel file signature | application/octet-stream
Quicken data file
Magic Bytes
Offset 0
50 61 56 45
Sources: Gary Kessler
All Known Signatures
2 signature variants are documented for .qel files across multiple sources.
| Hex Signature | Offset | Sources |
|---|---|---|
| 50 61 56 45 | 0 | Gary Kessler |
| 92 5C BE FF E5 45 4C 20 | 0 | Gary Kessler |
Extension
.qel
MIME Type
application/octet-stream
Byte Offset
0
Risk Level
Safe
Validation Code
How to validate .qel files in Python
def is_qel(file_path: str) -> bool:
"""Check if file is a valid QEL by magic bytes."""
signature = bytes([0x50, 0x61, 0x56, 0x45])
with open(file_path, "rb") as f:
return f.read(4) == signature
How to validate .qel files in Node.js
function isQEL(buffer: Buffer): boolean {
const signature = Buffer.from([0x50, 0x61, 0x56, 0x45]);
return buffer.subarray(0, 4).equals(signature);
}
How to validate .qel files in Go
func IsQEL(data []byte) bool {
signature := []byte{0x50, 0x61, 0x56, 0x45}
if len(data) < 4 {
return false
}
return bytes.Equal(data[:4], signature)
}
API Endpoint
/api/v1/qel
curl https://filesignature.org/api/v1/qel
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .qel file?
A .qel file is a Quicken data file file. Quicken data file
What are the magic bytes for .qel files?
The magic bytes for Quicken data file files are 50 61 56 45 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .qel file?
To validate a .qel file, read the first bytes of the file and compare them against the known magic bytes (50 61 56 45) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .qel files?
There is no officially registered MIME type for .qel files. Systems typically use application/octet-stream as a generic fallback when handling this format.
Is it safe to open .qel files?
Quicken data file (.qel) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.