com.intel.ManagementEngine.PCHC

Size 4.0 KiB
Entropy 3.7
GUID c759d06f-00b7-54c8-9084-0efc8361c93d
SHA256 5823b27923fb5794d2189b51da3ae085e9a63f11c1fab2d954db7c163b32a73b

com.intel.ManagementEngine.TBTP

Size 256.0 KiB
Entropy 6.88
GUID c9913be5-9803-50b1-b545-f1af225a7a3a
SHA256 28f2a049c280c109a71bf5c46c23442c44eb270961e7f83a2bc8236480ff3638

com.intel.ManagementEngine.NPHY

Size 60.0 KiB
Entropy 6.23
GUID c28ab20f-1d45-5c1e-bfba-1c1b8637ee37
SHA256 4bc6dc8b9e1828f357d2567cec7a156f5c446d495e6abbcb270aa8feb20edf3c

com.intel.ManagementEngine.IOMP

Size 72.0 KiB
Entropy 6.55
GUID ebd7e1af-c8d5-5b87-bf42-918a0999ebf9
SHA256 1cc0c113bfb9342146ca9cd268a1d7dcee7b6da7699596e2e367eacef1c39632

com.intel.ManagementEngine.OEMP

This Intel Management partition contains various OEM-provided public keys for signing data.

Size 1.2 KiB
Entropy 6.69
GUID 642c732c-d77d-5d4a-963d-4d5f2977f3cc
SHA256 292a4b49d3c406ff97e7f7aa7c6c1090fcaa1428ae83be60ec8d965d5f87dfec

com.intel.ManagementEngine.PMCP

This Intel Management partition provides ARC firmware for the Power Management Controller (PMC).

Size 152.0 KiB
Entropy 6.57
GUID ff2b4262-d1e8-5442-a002-7902d8facbaa
SHA256 96409d60383d5f4351e9b361a6a625099b4f1342c484cf9efe6204d57e5e7c9e

com.intel.ManagementEngine.FITC

Size 32.0 KiB
Entropy 2.34
GUID df0d12f6-b81b-5556-a65a-184c4f1e9af4
SHA256 5f6f0f42de9875c8f6bb023e21382eb76b4dd8f877238920193e1b79878da4ed

com.intel.ManagementEngine.IMDP

Size 64.0 B
Entropy 2.69
GUID 2f807ad0-d71d-5ffe-bd60-0a56ded005d3
SHA256 a0217370c5d210a8637b6439a902fd4473056bb43a276bb567b2f133a19f2fcb

com.intel.ManagementEngine.RSTR

This Intel Management partition is used to request the reset of Private RTC (PRTC) which store some ME runtime data. It is probably only used during firmware update. Only the first DWORD #1 (offset 4) has meaning. If it is 0x55555555 then the RBE module zeroes the PRTC during platform startup.

Size 24.0 B
Entropy 0.79
GUID 99064fec-f7da-5914-9270-f2f4e732a363
SHA256 78a5008744ef4fec6fabc0a97dca8385737b295fe6e6aa30e02c9b4850dc93f8

com.intel.ManagementEngine.EFS

Size 64.0 KiB
Entropy 0.06
GUID 9fdff9c0-e5e3-573c-aa8a-dfa4850642ca
SHA256 9e9a0109ef7f68e597e12594edd075c0b3ba8e49ac0bdf00bb7a33eba3dd574f

com.intel.ManagementEngine.FLOG

This Intel Management partition provides a flash log that contains error and warning messages generated by ME modules, the data written here is a subset of the data output to the Tracehub.

Size 8.0 KiB
GUID dfa881ba-d45b-5ef1-9fcf-4882cea6e1db
SHA256 7d2c7ac4888bfd75cd5f56e8d61f69595121183afc81556c876732fd3782c62f

com.intel.ManagementEngine.LOCL

This Intel Management partition provides translations for various AMT strings.

Size 16.0 KiB
Entropy 2.15
GUID 80d4b98b-664d-5b56-ae7f-05add217383a
SHA256 8d8a7eab552743d8895999e22fb42d3da0919302562146105326bd15e868e2d9

com.intel.ManagementEngine.WCOD

This Intel Management partition contains the Wireless LAN microcode.

Size 512.0 KiB
Entropy 7.0
GUID b86d5ac6-fe84-5d4b-a885-19ff3edb2f5e
SHA256 e05f610b73646097ffc3ce5ce6b14398517cd8963002d52a866e4fc5205fb079

com.intel.ManagementEngine.RBEP

This Intel Management partition stores ROM Boot Extensions (CSE-RBE) and is digitally signed by Intel.

Size 96.0 KiB
Entropy 7.68
GUID 6ecf9a4e-e07b-5b03-bba6-198e6726cc0b
SHA256 11ef239d5e92bdb7bb5fd38696ba3a1f3a0ff92cd2af56b61e4702bfa6251ea4

com.intel.ManagementEngine.HVMP

This Intel Management high volume manufacturing partition is used by manufacturers to override the default SKU configuration (features of Q/H/Z chip versions) burned in fuses for a particular Platform Controller Hub (PCH). It is a new feature of CSME 12 firmware for CannonPoint chipsets.

Size 12.0 B
GUID d454263e-9d97-51f2-96c9-bf699d411ba7
SHA256 8688d249e9d047b4fc2fb89ce05afe9ec89252ffccdd969de6eef260dd7ffb21

com.intel.ManagementEngine.UTOK

This Intel Management block partition stores an OEM unlock token used to unlock debugging for the ME or Integrated Sensor Hub (ISH). This token is cryptographically signed by either the Intel private key or by an OEM private key, granting a level of access depending on which key was used. GREEN access is the default, when no UTOK is present and only allows TraceHub tracing and debug of the host CPU. ORANGE unlock allows debug of the Intel Sensor Hub, and RED unlock allows debugging the ME but will clear secrets from its memory before doing so.

Size 8.0 KiB
Entropy 0.01
GUID d62fac2d-36c1-59e4-977c-28ccbaa64a74
SHA256 53a2b4f0413e3f5244c5fdc4353d75d904481ae95207a2bf0235276782e7765c

com.intel.ManagementEngine.NFTP

This Intel Management partition is a code Non-Fault Tolerant Partition and provides additional code to the BUP. It is digitally signed by Intel.

Size 3.7 MiB
Entropy 7.21
GUID 2749ab68-bcde-5e19-9f2f-b802d6f7e1d7
SHA256 c7e347590932df8c7c565d924945362c544576d8cb6a2d04c81e5442cdb6adff

com.intel.ManagementEngine.MFS

This Intel Management partition stores a file system that contains ME-related data stored between runs. The low-level MFS implementation does not support file names or sizes. Files are identified by numbers.

Size 1.2 MiB
Entropy 0.03
GUID 5abfb339-331f-55af-9bf9-31f4aa80387e
SHA256 6efd56b2d1e6378ecdd1e3ff47b52eddaf7525c2cc02fc3949497316030b0cf8

com.intel.ManagementEngine.IVBP

This Intel Management encrypted block partition is used for “warm” start (like hibernate restoration) and is integrity protected with HMAC. It is unique for each platform (PCH-chip) and each boot.

Size 16.0 KiB
GUID 6312624b-3631-5317-9f47-519260d8eb52
SHA256 0fbba07a833d4dcfc7024eaf313661a0ba8f80a05c6d29b8801c612e10e60dee

com.intel.ManagementEngine.FTPR

This Intel Management partition is a Fault Tolerant Partition (FTP) code partition. Digitally signed processes of the correct type are started from this module, much like autorun. It is digitally signed by Intel.

Size 1.3 MiB
Entropy 7.51
GUID cbe73b88-8057-5046-80f5-0a5586268634
SHA256 2a7c8de1ca0baf133517beedf257271b3c33017cf73cd5fa85f96f09629b669a

com.intel.ManagementEngine.PSVN

This optional Intel Management partition stores the previous SVN (Secure Version Number) value and is used to calculate “previous security keys”. It must be impossible to install ME firmware with previous SVN without direct writing SPI Flash with chip programmer. Updates to the SVN causes alteration of related security keys. Having access to both “previous” and “current” keys allows migration of the MFS file system from old to new keys.

Size 512.0 B
GUID cb1536bf-79b3-5f45-a765-344360a4327b
SHA256 9f56cda75fefeab90f6fa5d5ddc9601544b121732c5ecccab32e631060453a5d

com.github.LongSoft.UEFITool

UEFI firmware image viewer and editor

Size 135.0 B
Entropy 4.36
GUID 463191c7-fade-51b1-a0ba-eef794d26632
SHA256 ebc7c0e586aee58eeda2b296ca50f63542230619390104a9661a99fd84116a3f
SHA1 e7593c97f492983554dacb53c6f0ce9d391929de

org.uefi.Driver

Size 81.7 KiB
Entropy 5.54
GUID 0162d06e-41ef-43ca-bb59-90a00cf88592
SHA256 a36edd499207fa0f489250a2b5f78f896b949aca20198f57b9fd6150f023351e
SHA1 f84b11840d00330d26bdd1134f123e1ccc56ebaa

org.uefi.Driver

Size 74.5 KiB
Entropy 5.88
GUID 91a5e4a3-1839-4aba-ab51-1ea8519a374a
SHA256 e137c59b58b58f23bcd06cc9c3cc8904a205e7f4aac2f55672985d4bdc5fe75c
SHA1 fa8f0d015ee10e7f4fc6fd33bf7f1a0e948e401a

LVFS © 2015 Richard Hughes with icons from Font Awesome and GeoIP data from IP2Location.

Linux Vendor Firmware Service Project a Series of LF Projects, LLC :: Charter