Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
[REQUEST] Fujitsu Esprimo D965 "CFG Loc...
Last Post: feathertophat
Yesterday 11:41 PM
» Replies: 1
» Views: 1148
[REQUEST] Resizable BAR for Lenovo m720q...
Last Post: elfloko
Yesterday 10:13 AM
» Replies: 1
» Views: 1404
disabling amd prochot with moded bios.
Last Post: vorajeeah
11-03-2025 09:27 AM
» Replies: 2
» Views: 847
[REQUEST] ThinkPad X1 Carbon (20A7 & 20A...
Last Post: neax61
11-03-2025 05:46 AM
» Replies: 87
» Views: 50645
[REQUEST] Lenovo G50-80 (B0CNxxWW) White...
Last Post: Leonardosena
11-02-2025 04:17 PM
» Replies: 110
» Views: 66094
bios f.02 Help!!!
Last Post: karbonid777
11-02-2025 12:21 PM
» Replies: 0
» Views: 177
[REQUEST] Lenovo Ideadpad N581 Whitelist...
Last Post: Dudu2002
11-01-2025 02:07 PM
» Replies: 238
» Views: 115941
[REQUEST] Lenovo ThinkPad T480s (N22ETxx...
Last Post: Dudu2002
11-01-2025 06:31 AM
» Replies: 25
» Views: 15404
[REQUEST] Lenovo G500 (78CNxxWW) BIOS Un...
Last Post: dump_bios_gg
11-01-2025 04:59 AM
» Replies: 290
» Views: 201552
X550VXK BIOS Unlock Request
Last Post: laret
11-01-2025 03:35 AM
» Replies: 1
» Views: 257
[REQUEST] HP EliteBook 640 G9 – Remove W...
Last Post: dlareklami
10-31-2025 04:20 AM
» Replies: 0
» Views: 224
Help with DMI Info Lenovo Bios
Last Post: force9da
10-30-2025 04:04 PM
» Replies: 0
» Views: 263
Lenovo z510 i5-4200m to i7-4700mq upgrad...
Last Post: ClaudeSpeed
10-30-2025 03:42 PM
» Replies: 7
» Views: 378
Dell Optiplex 790 bypass Press F1 during...
Last Post: jozsef_kacso
10-30-2025 04:19 AM
» Replies: 5
» Views: 17011
[REQUEST] Whitelist Removal for lenovo v...
Last Post: konjiki no yami
10-29-2025 07:36 PM
» Replies: 0
» Views: 280
[REQUEST] HP dv6-6b57el hidden menu
Last Post: Alcatraz
10-29-2025 04:28 PM
» Replies: 1
» Views: 316
[REQUEST] Lenovo IdeaPad L340 (BGCNxxWW)...
Last Post: Dudu2002
10-29-2025 03:19 PM
» Replies: 97
» Views: 55487
[REQUEST] Acer Aspire V5-121 Bios Unlock
Last Post: Strongbox256
10-29-2025 11:15 AM
» Replies: 5
» Views: 9174
[REQUEST] Eglobal S210H BIOS Unlock
Last Post: ShawnSuter
10-29-2025 10:50 AM
» Replies: 145
» Views: 64800
Request: Unlock CPU Voltage (Vcore) for ...
Last Post: hoomaan
10-29-2025 10:35 AM
» Replies: 0
» Views: 227

Extracting boot logo & other stuff from a UEFI Tiano/Insyde .FD image
#1
Lightbulb 
There are essentially two ways to extract graphics from an .FD UEFI BIOS image:

(1) Look for capsules with specific GUIDs known to contain it, such as:

Code:
E5BBF7BE-2417-499B-97DB-39F4896391BC,SplashLogoPackage
1FFF93C2-8C76-49E4-8AB3-43D92F5445EF,LogoJpg
6F0CF054-AE6A-418C-A7CE-3C7A7CD74EC0,LogoPcx

(2) Search for magic strings associated with particular image formats, for example:
  • BMP: "BM" string
  • GIF: "GIF89a" string
  • JPEG: "JFIF" string
  • PCX: hexadecimal 0A 05 01 08
The .FD image can be decompressed with a number of tools, in particular: Phoenix Tool, UEFI Tool, or simply binwalk. The last two also include search capabilities. Otherwise, files can be searched with grepWin once decompressed.

I've succesfully extracted boot logos and other graphics from a number of Lenovo laptop BIOSes using the above methods, all of which yield the same results. Here's an example of what can be found once decompressed:

Code:
# <GUID>
[<LaptopModel>_<BiosVersion>] <File>

# 1FFF93C2-8C76-49E4-8AB3-43D92F5445EF,LogoJpg
[B460_1DCN26WW_4FCNAWW] 1024x768 JPEG: Boot logo (40,693 bytes; inside CRC32 GUID: FC1BCDB0-7D31-49AA-936A-A4600D9DD083)

# 6F0CF054-AE6A-418C-A7CE-3C7A7CD74EC0,LogoPcx
[Y700_CDCN53WW] 1024x768 PCX, 8-bit: All black (27,068 bytes)

# 771F77D1-13AF-48BF-2584-773D389E33CA
[Y700_CDCN53WW] 360x360 JPEG: "Invalid Public Key for Secure Flash" (17,656 bytes)

# 931F00D1-10FE-48BF-AB72-773D389E3FDA
[Y700_CDCN53WW] 208x157 BMP, 8-bit: Intel logo (33,236 bytes)

# 931F77D1-10FE-48BF-AB72-773D389E3FAA
[Y700_CDCN53WW] 300x300 BMP, 24-bit: Insyde logo (270,056 bytes)

# 156A8FFE-62DB-4FF3-82AD-2EBD8A3E3DF7
[Y520_4KCN24WW] [Y900_D0CN34WW] 768x432 GIF89a: Boot logo, animated (128,090 bytes)

# 1F56B2F9-6E6D-4014-BFD4-37C9E5D398F1
[Y520_4KCN24WW] 1536x864 GIF89a: Boot logo, animated (406,313 bytes)

# E5BBF7BE-2417-499B-97DB-39F4896391BC,SplashLogoPackage
[110_1QCN20WW] 548x308 JPEG: Boot logo (17,169 bytes; followed by a GIF w/icons)
[110_1QCN31WW] 548x308 JPEG: Boot logo (53,046 bytes; followed by a GIF w/icons)
[700_E5CN58WW] 548x308 JPEG: Boot logo (49,368 bytes; followed by several GIFs w/icons)

However, none of the above methods manage to locate the boot logo in Lenovo Y700 images such as CDCN37WW.fd and CDCN53WW.fd (attached), although it is clearly somewhere there. Can anyone tell me what I am missing?

Possibly the logo is in a format other than BMP/GIF/JPG/PCX. The BIOS images have a "TgaDecoderDxe" module inside. Could there be any TGA (Targa) images there? If so, how to find them? Or is it something else altogether? Like obfuscation with XOR or something more sophisticated? Suggestions appreciated.


Attached Files
.zip   CDCN53WW.fd.zip (Size: 4.02 MB / Downloads: 29)
find
quote


Forum Jump:


Users browsing this thread: 1 Guest(s)