[Request] BIOS mod ASUS VivoBook 15 X510UR

I used AMIBCP to modify the BIOS file, navigating through the desired folders, subfolders, and options, and changed them from ‘default’ to ‘user’. After saving the file (without creating a new one), I received a warning that the BIOS was not signed. I noticed that the size of the backup file created by AFUWIN is smaller than the saved file.

When I tried flashing using AFUWIN, an error occurred indicating that the file size was not as expected, so I decided not to proceed. What would be the best procedure in this case?

Information:
Version: 310
System: Windows Hirenboot


Edit by Fernando: Thread title shortened and customized

[Guide] Usage of AMI’s AptioV UEFI Editor + FPT Flash Method - BIOS/UEFI Modding / BIOS Modding Guides and Problems - Win-Raid Forum

[TOOL] UEFI Editor - BIOS/UEFI Modding / BIOS Modding Guides and Problems - Win-Raid Forum

ME Analyzer: Intel Engine Firmware Analysis Tool Discussion - Special Topics / Intel Management Engine - Win-Raid Forum

Intel (Conv.Sec.) Management Engine: Drivers, Firmware and Tools (2-15) - Special Topics / Intel Management Engine - Win-Raid Forum

1 Like

I’ll try tomorrow, Thanks.

Good afternoon,

I am trying to unlock certain menus, sections, and submenus in the BIOS of the ASUS X510URR model but have been unsuccessful. The sections I want to unlock are shown in the attached image. I do not need the CPU VR options.

Here is the official link to the firmware/BIOS:
Official Firmware Link

I would like to keep the area responsible for booting unchanged when flashing the BIOS to ensure a recovery option in case something goes wrong. I plan to follow this guide for the process:
AMI AptioV UEFI Editor & FPT Flash Method Guide

If any additional information is needed, I am happy to provide it.
Thanks in advance for your time and help!

Much appreciated!

ME version via HWInfo and currently visible menu in bios setup

Here.

(Advanced mode, have EZ Mode)


(ME version)

from the link above, download CSME System Tool v11 and run MEInfo, make sure measured and verified boot on parameter FPF not set to enable

I used System Tools v11 r46.
It seems to me that there are no blocks…

MEInfoWin64.exe -verbose

Intel(R) MEInfo Version: 11.8.92.4189
Copyright(C) 2005 - 2020, Intel Corporation. All rights reserved.




Windows OS Version : 10.0

FW Status Register1: 0x90000245
FW Status Register2: 0x060B0506
FW Status Register3: 0x00000020
FW Status Register4: 0x00084000
FW Status Register5: 0x00000000
FW Status Register6: 0x40000000

  CurrentState:                               Normal
  ManufacturingMode:                          Disabled
  FlashPartition:                             Valid
  OperationalState:                           CM0 with UMA
  InitComplete:                               Complete
  BUPLoadState:                               Success
  ErrorCode:                                  No Error
  ModeOfOperation:                            Normal
  SPI Flash Log:                              Not Present
  FPF HW Source value:                        Not Applicable
  ME FPF Fusing Patch Status:                 ME FPF Fusing patch NOT applicable
  Phase:                                      ROM/Preboot
  ICC:                                        Valid OEM data, ICC programmed
  ME File System Corrupted:                   No
  PhaseStatus:                                CALL_NEXT_MODULE
  FPF and ME Config Status:                   Match
FW Capabilities value is 0x31111240
Feature enablement is 0x31111240
Platform type is 0x41130321

example:

The only information that appeared was what I previously sent. Perhaps the Intel ME is outdated (I will check), or the BIOS is restricting access to this information. Additionally, RW Everything might be useful for displaying these details.

@karfel

Here.

we’re good to go then.

in FPT as administrator:
ftpw64.exe -d dump.bin ← this is your bios image, keep it safe. If something goes wrong, you can use a programmer.

ftpw64.exe -bios -d region.bin ← this is where the playground for modding, send it here.

edit:
sorry, i missed the boot guard status that you sent from HWInfo lmao

Hey, I’m going to sleep, tomorrow I’ll send the file. But to be sure I’ll send all the images here again.





@karfel
Here.
Secure Boot and TPM are disabled, I’m using CSM (region.bin and dump.bin may have these settings) If necessary I put the default values.
region.zip (4.4 MB)

here, test the user mod first. If the new advanced tab still doesn’t show, try the unsuppressed one.

follow the FPT Flash method from here.

Hi, I’m going to flash it with this command: FPTW.exe -bios -savemac -f mod_region_user.rom

Can I proceed? Or do I have to do something first?

It should be fine. I think even if it doesn’t work, the device can still boot to Windows. It just can’t access the setup menu BIOS. If that happens, reflash it again with the original region.

note:
This BIOS is a little different in how hidden values are set in AMITE PE32, unlike other devices, so the result is unknown.

Form setup : 4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15

visible
Ref: Main, FormId: 0x2711 {0F 0F 08 00 02 00 01 00 00 00 FF FF 00 11 27}
Ref: Advanced, FormId: 0x2717 {0F 0F 1E 00 02 00 07 00 00 00 FF FF 00 17 27}
Ref: Boot, FormId: 0x2718 {0F 0F 20 00 02 00 08 00 00 00 FF FF 00 18 27}
Ref: Security, FormId: 0x2719 {0F 0F 3A 00 02 00 09 00 00 00 FF FF 00 19 27}
Ref: Save & Exit, FormId: 0x271A {0F 0F 4D 00 02 00 0A 00 00 00 FF FF 00 1A 27}

target
Ref: Advanced, FormId: 0x2712 {0F 0F 1E 00 02 00 02 00 00 00 FF FF 00 12 27}
Ref: Chipset, FormId: 0x2713 {0F 0F 1F 00 02 00 03 00 00 00 FF FF 00 13 27}

hidden (value does not same as setup form menu???)
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 11 27 00 00 07 10 00 00 ← Main
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 12 27 00 00 08 10 00 00 ← advanced target
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 13 27 00 00 09 10 00 00 ← chipset
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 15 27 00 00 0A 10 00 00 ← boot
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 14 27 00 00 0B 10 00 00 ← security
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 1B 27 00 00 0C 10 00 00 ← save & exit

setup form menu
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 17 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 18 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 19 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 1A 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00
4A 10 59 7B 0D C0 58 41 87 FF F0 4D 63 96 A9 15 12 27 00 00 00 00 00 00 00 00 00 00 00 00 00 00

learn material

I’m sure that all users seeking bios mod files have in mind that they can break their system and make post/boot a blank/black picture… do you know how to recover a death system?
Some users seeking bios mods, hope that they are safe and nothing will fail…wrong assumption.
It’s just a little reminder… the asset is yours and your decision only.

The only way to recover on this notebook would be via rewriting, but I don’t know if CTRL + HOME works.

Eh… Now I need to unlock this, if it is unlockable in this BIOS. What would be an EPROM model that would work on this notebook?