Dell update exe used for this guide: https://www.badcaps.net/forum/showthread.php?t=115816
Some of the newer dell updates can`t be extracted using PFS extract, or using the command line with the switches ( /writeromfile etc) .These types of updates are an AFUDELL application
EDIT: You can also use AMI UCP extract by platomav -> https://github.com/platomav/BIOSUtilities .The last compiled windows version is attached to this post

To extract,first we need to use AMIUCP.Select the @R00 file ,select the extract button under the functions and select where to save the file.You can save it as Rom.bin or any other name .When you click on Apply it will be saved to the location you chose.

Close AMIUCP, open the saved file with a hex editor.At the top you can see the word AMIPFAT.

The next step is to extract the file with AMI PFAT Extractor.
After its extracted open the DATA_ALL file with a hex editor.The PFAT header at the top has been deleted but the end part hasn`t,so you need to find out where the end of the file is to edit to the correct size.
The DATA_END file can be deleted,and the 0 KB file above it. Open the next file up "Rom.bin -- 1_10 -- BIOS_FV_FSPTM.bin" ,go to the end of the file,copy the last line as hex and search in DATA_ALL for the hex to find the end off-set.


Alternatively you can join the files 1_01 to 1_10 using a batch command,file joining software or a hex editor.
Credit to Ciber SLasH at vlab for the AMIUCP settings guide
.
Some of the newer dell updates can`t be extracted using PFS extract, or using the command line with the switches ( /writeromfile etc) .These types of updates are an AFUDELL application
EDIT: You can also use AMI UCP extract by platomav -> https://github.com/platomav/BIOSUtilities .The last compiled windows version is attached to this post
To extract,first we need to use AMIUCP.Select the @R00 file ,select the extract button under the functions and select where to save the file.You can save it as Rom.bin or any other name .When you click on Apply it will be saved to the location you chose.
Close AMIUCP, open the saved file with a hex editor.At the top you can see the word AMIPFAT.
The next step is to extract the file with AMI PFAT Extractor.
After its extracted open the DATA_ALL file with a hex editor.The PFAT header at the top has been deleted but the end part hasn`t,so you need to find out where the end of the file is to edit to the correct size.
The DATA_END file can be deleted,and the 0 KB file above it. Open the next file up "Rom.bin -- 1_10 -- BIOS_FV_FSPTM.bin" ,go to the end of the file,copy the last line as hex and search in DATA_ALL for the hex to find the end off-set.
Alternatively you can join the files 1_01 to 1_10 using a batch command,file joining software or a hex editor.
Credit to Ciber SLasH at vlab for the AMIUCP settings guide

.
Comment