<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.bios-mods.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Brainsucker</id>
		<title>Bios Mods -The Best BIOS Update and Modification Source Wik - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.bios-mods.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Brainsucker"/>
		<link rel="alternate" type="text/html" href="https://www.bios-mods.com/wiki/Special:Contributions/Brainsucker"/>
		<updated>2026-05-12T21:40:31Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.28.2</generator>

	<entry>
		<id>https://www.bios-mods.com/w/index.php?title=How_to_dump_RSA_signed_Insyde_BIOS&amp;diff=38</id>
		<title>How to dump RSA signed Insyde BIOS</title>
		<link rel="alternate" type="text/html" href="https://www.bios-mods.com/w/index.php?title=How_to_dump_RSA_signed_Insyde_BIOS&amp;diff=38"/>
				<updated>2013-08-17T08:14:18Z</updated>
		
		<summary type="html">&lt;p&gt;Brainsucker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Starting from 2012 Insyde Corp. implemented RSA algorithm to crypt their BIOSs to avoid modding. To unpack such BIOS with Phoenix tool is impossible. However, we are 100% certain that the BIOS rom stored in the motherboard is a decrypted variant. The easiest way to get it - make a backup of current BIOS before flashing with the new one. But we can also flash with a modded BIOS version over the same BIOS version number.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here are the instructions: &lt;br /&gt;
&lt;br /&gt;
=== Flasher (platform.ini) way ===&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;1&amp;#039;&amp;#039;&amp;#039;. Take your current executable BIOS flasher.&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;2&amp;#039;&amp;#039;&amp;#039;. Unpack with any unzip software&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;3&amp;#039;&amp;#039;&amp;#039;. Find &amp;quot;platform.ini&amp;quot; file&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;4&amp;#039;&amp;#039;&amp;#039;. Edit following lines with Notepad&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;[BackupROM]&amp;lt;/tt&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;tt&amp;gt;Flag=1&amp;lt;/tt&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;tt&amp;gt;FilePath=c:&amp;lt;/tt&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;tt&amp;gt;FileName=&amp;lt;put bios name here&amp;gt;.BIN&amp;lt;/tt&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;5&amp;#039;&amp;#039;&amp;#039;. Flash the same BIOS again with the modified platform.ini&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;6&amp;#039;&amp;#039;&amp;#039;. After reboot you will find dumped current BIOS on C drive&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== UEFI way (EFI system partition) ===&lt;br /&gt;
&lt;br /&gt;
On some new platforms (for example HP Envy 17 (17-j005tx) &amp;#039;2013) BIOS reading (backup) feature is disabled. In such case flasher will show the following error message &amp;#039;&amp;#039;&amp;#039;IHISI: flash read error in SMI!&amp;#039;&amp;#039;&amp;#039; and the system will hang (on some notebooks you might even need to unplug power and remove battery to shutdown system).&lt;br /&gt;
[[File:Flash read error small.jpg]]&lt;br /&gt;
It doesn&amp;#039;t seem to depend on Windows version or type (x64/x86), even WinPE recovery disks won&amp;#039;t help.&lt;br /&gt;
&lt;br /&gt;
However in most such cases flasher won&amp;#039;t update BIOS directly, but will use UEFI BIOS update procedure (after rebooting). New BIOS is copied (in unencrypted form) to UEFI partition, so we just need to find it there. &lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;EFI System Partition&amp;#039;&amp;#039;&amp;#039; is not normally visible in Windows and you won&amp;#039;t be able to assign a disk letter to it using standard Disk Manager. However the following command in console under Administrator account (Run as Administrator - elevated command prompt is required) will help (mounting EFI partition as disk X:):&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;tt&amp;gt;mountvol X: /S&amp;lt;/tt&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
You might want to run this command from some console file manager (like FAR, http://farmanager.com/) or run your file manager side-by-side under Administrator account, since X: disk won&amp;#039;t be visible/accessible otherwise.&lt;br /&gt;
Then walk through disk X: (just don&amp;#039;t delete or modify anything) looking for copies of your unencrypted BIOS, for HP Envy 17 they were found in &amp;#039;&amp;#039;&amp;#039;X:\EFI\HP\BIOS\Current&amp;#039;&amp;#039;&amp;#039; folder, in form of &amp;#039;&amp;#039;&amp;#039;01966.bin&amp;#039;&amp;#039;&amp;#039; file (instead of original encrypted 01966.fd).&lt;/div&gt;</summary>
		<author><name>Brainsucker</name></author>	</entry>

	<entry>
		<id>https://www.bios-mods.com/w/index.php?title=File:Flash_read_error_small.jpg&amp;diff=37</id>
		<title>File:Flash read error small.jpg</title>
		<link rel="alternate" type="text/html" href="https://www.bios-mods.com/w/index.php?title=File:Flash_read_error_small.jpg&amp;diff=37"/>
				<updated>2013-08-17T07:55:54Z</updated>
		
		<summary type="html">&lt;p&gt;Brainsucker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Brainsucker</name></author>	</entry>

	</feed>