Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
HP Pro 3300 & 3400 (H61): Upgrade to Ivy...
Last Post: acidmonkey
Today 10:50 AM
» Replies: 136
» Views: 142040
[REQUEST] Lenovo Y400 & Y500 (6BCNxxWW) ...
Last Post: Koem
Today 03:44 AM
» Replies: 162
» Views: 103413
overclocking msi b150 gaming m3
Last Post: SunseleGroz
Yesterday 11:23 PM
» Replies: 1
» Views: 4373
[REQUEST] Lenovo B50-70 (9DCNxxWW) BIOS ...
Last Post: MrVK13
Yesterday 05:13 PM
» Replies: 76
» Views: 56280
[REQUEST] Lenovo G780 (5ECNxxWW) Whiteli...
Last Post: Dudu2002
Yesterday 10:54 AM
» Replies: 886
» Views: 552587
Optiplex 7050 8th gen support
Last Post: Idaho
Yesterday 10:07 AM
» Replies: 7
» Views: 275
Need bios dump for Dell Precision M4800
Last Post: Waldfruchttee
Yesterday 09:55 AM
» Replies: 0
» Views: 105
[REQUEST] Lenovo T440(S) (GJETxxWW) Whit...
Last Post: Paul Withers
Yesterday 09:22 AM
» Replies: 501
» Views: 288459
bios unlock request aorus 15 xe4
Last Post: Sinon2k26
02-20-2026 09:00 PM
» Replies: 2
» Views: 354
BIOS Unlock ASUS TUF F15 FX506HE Gaming ...
Last Post: laret
02-20-2026 07:03 PM
» Replies: 3
» Views: 2741
[REQUEST] Lenovo G570 (40CNxxWW) Whiteli...
Last Post: eisen1000
02-20-2026 03:16 PM
» Replies: 173
» Views: 183705
Boot Password on Asus UX330U (solved)
Last Post: neverstop
02-20-2026 03:09 PM
» Replies: 0
» Views: 225
Abit IP35 Pro: Microcode Update
Last Post: DeathBringer
02-20-2026 01:26 PM
» Replies: 10
» Views: 10486
AMI Bios flash tool - AFUDOS.EXE
Last Post: Ondrej2005
02-20-2026 05:05 AM
» Replies: 12
» Views: 198473
HP Omen EC firmware for 509V5AV - 17t-Ck...
Last Post: fixbricked
02-19-2026 04:41 PM
» Replies: 0
» Views: 213
[REQUEST] Lenovo B580 (H5ETxxWW) Whiteli...
Last Post: Sverhnoviy
02-19-2026 04:30 PM
» Replies: 83
» Views: 49660
[REQUEST] Acer Predator Helios 300 PH315...
Last Post: carlmour
02-19-2026 12:08 PM
» Replies: 47
» Views: 33210
[REQUEST] Lenovo Ideapad Z710 (7FCNxxWW)...
Last Post: zhaduga
02-19-2026 10:22 AM
» Replies: 230
» Views: 189474
Default original bios file for Acer Pred...
Last Post: Aliraaaza19977
02-19-2026 07:20 AM
» Replies: 0
» Views: 233
[REQUEST] Lenovo IdeaPad L340 (BGCNxxWW)...
Last Post: Dudu2002
02-19-2026 04:39 AM
» Replies: 107
» Views: 69828

Extracting boot logo & other stuff from a UEFI Tiano/Insyde .FD image
#1
Lightbulb 
There are essentially two ways to extract graphics from an .FD UEFI BIOS image:

(1) Look for capsules with specific GUIDs known to contain it, such as:

Code:
E5BBF7BE-2417-499B-97DB-39F4896391BC,SplashLogoPackage
1FFF93C2-8C76-49E4-8AB3-43D92F5445EF,LogoJpg
6F0CF054-AE6A-418C-A7CE-3C7A7CD74EC0,LogoPcx

(2) Search for magic strings associated with particular image formats, for example:
  • BMP: "BM" string
  • GIF: "GIF89a" string
  • JPEG: "JFIF" string
  • PCX: hexadecimal 0A 05 01 08
The .FD image can be decompressed with a number of tools, in particular: Phoenix Tool, UEFI Tool, or simply binwalk. The last two also include search capabilities. Otherwise, files can be searched with grepWin once decompressed.

I've succesfully extracted boot logos and other graphics from a number of Lenovo laptop BIOSes using the above methods, all of which yield the same results. Here's an example of what can be found once decompressed:

Code:
# <GUID>
[<LaptopModel>_<BiosVersion>] <File>

# 1FFF93C2-8C76-49E4-8AB3-43D92F5445EF,LogoJpg
[B460_1DCN26WW_4FCNAWW] 1024x768 JPEG: Boot logo (40,693 bytes; inside CRC32 GUID: FC1BCDB0-7D31-49AA-936A-A4600D9DD083)

# 6F0CF054-AE6A-418C-A7CE-3C7A7CD74EC0,LogoPcx
[Y700_CDCN53WW] 1024x768 PCX, 8-bit: All black (27,068 bytes)

# 771F77D1-13AF-48BF-2584-773D389E33CA
[Y700_CDCN53WW] 360x360 JPEG: "Invalid Public Key for Secure Flash" (17,656 bytes)

# 931F00D1-10FE-48BF-AB72-773D389E3FDA
[Y700_CDCN53WW] 208x157 BMP, 8-bit: Intel logo (33,236 bytes)

# 931F77D1-10FE-48BF-AB72-773D389E3FAA
[Y700_CDCN53WW] 300x300 BMP, 24-bit: Insyde logo (270,056 bytes)

# 156A8FFE-62DB-4FF3-82AD-2EBD8A3E3DF7
[Y520_4KCN24WW] [Y900_D0CN34WW] 768x432 GIF89a: Boot logo, animated (128,090 bytes)

# 1F56B2F9-6E6D-4014-BFD4-37C9E5D398F1
[Y520_4KCN24WW] 1536x864 GIF89a: Boot logo, animated (406,313 bytes)

# E5BBF7BE-2417-499B-97DB-39F4896391BC,SplashLogoPackage
[110_1QCN20WW] 548x308 JPEG: Boot logo (17,169 bytes; followed by a GIF w/icons)
[110_1QCN31WW] 548x308 JPEG: Boot logo (53,046 bytes; followed by a GIF w/icons)
[700_E5CN58WW] 548x308 JPEG: Boot logo (49,368 bytes; followed by several GIFs w/icons)

However, none of the above methods manage to locate the boot logo in Lenovo Y700 images such as CDCN37WW.fd and CDCN53WW.fd (attached), although it is clearly somewhere there. Can anyone tell me what I am missing?

Possibly the logo is in a format other than BMP/GIF/JPG/PCX. The BIOS images have a "TgaDecoderDxe" module inside. Could there be any TGA (Targa) images there? If so, how to find them? Or is it something else altogether? Like obfuscation with XOR or something more sophisticated? Suggestions appreciated.


Attached Files
.zip   CDCN53WW.fd.zip (Size: 4.02 MB / Downloads: 29)
find
quote


Forum Jump:


Users browsing this thread: 1 Guest(s)