[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/wsr/ - Worksafe Requests

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: 98d0cd92f008a5fc.jpg (125 KB, 800x633)
125 KB JPG
Is there a way to rip graphics from a screensaver made with Axialis Screensaver Producer? Resource Hacker hasn't been helpful.
>>
if resource hacker didn't do it for you then likely not. once they're compiled into exe/scr it's pretty hard to extract anything useful. might be more worth your time to look for the original source of the screensaver
>>
>>1564208
What I'm particularly interested in LEGO screensavers from 2011 or newer. What are the odds I'd even find the "source" of those, really?
>>
>>1564208
Maybe decompress the EXE/SCR files first?
>>
Rename it to a .zip and open it up.
>>
>>1564219
>>1564232
No luck in that regard. I took a peek in hexed.it and the first part had the signs of being an EXE. That said, I did stumble upon this curiosity. Think it means anything?
>>
>>1564311
I'm not that guy, but this looks very promising.

JPEG files start with the bytes FF D8 FF. This sequence is literally there in the middle of line 2F80. This is where the file starts.
There's also a marker sequence for the end of a jpeg file: FF D9.
So if you start from FF D8 FF and take everything up to (including) the next occurrence of FF D9, that's your JPEG image.
Copy that into a new file with your hex editor and try it.
>>
>>1564316
With a bit of help from AI, I followed that line of thinking. It cooked up a Python script that managed to extract every image there!

Now if only it could "see" the filenames associated with each image and tag them accordingly, though that might take a bit more work with a bit more understanding of the screensaver's overall format.
>>
>>1564318
Oh yeah, the script did somehow extract what seemed to be two instances of "junk". I guess it was something that kinda looked like it fit the criteria of those byte sequences but still weren't actually images
>>
>>1564318
Cool, AI is very useful for tasks like this.
If it always includes the original path, you could try searching for that alongside the jpeg file signature (like capturing (b"C:\" ... b".jpg") ... 0xFF 0xD8 0xFF) and try to parse that. The string is May be more trouble than it's worth unless you want to extract lots of these files.
>>1564319
That could happen. It's worth checking manually to confirm the context is not like that of actual images.
>>
>>1564311
>>1564316
>>1564318
fucking cool



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.