Metabolix / HackBGRT

Windows boot logo changer for UEFI systems
MIT License
2.22k stars 239 forks source link

MakeBootEntry: Windows Boot Manager not found. #181

Closed arukateru closed 5 months ago

arukateru commented 5 months ago

What happens? Installation fails with the reason "Windows Boot Manager not found." Now what's weird is that reading the HackBGRT log, I don't see any mention of my Windows installation on the main drive, C:. I don't see its GUID in there either. But if I run bcdedit in cmd, it does show my Windows installation. The only thing I can think of is if HackBGRT is trying to read from a different BCD than the one for my system...but I'm not sure why that would be

How this happens? Explain exactly the steps you did:

  1. HackBGRT didn't give me problems until today when I messed up my bootloader and I had to reconfigure my boot files.
  2. I just started with a fresh BCD and reconfigured from there

Log file

Before I put the log, I will put the output of bcdedit in a command prompt to compare it to: C:\Windows\system32>bcdedit

Windows Boot Manager

identifier {bootmgr} device boot description Windows Boot Manager locale es-ES inherit {globalsettings} isolatedcontext Yes default {current} resumeobject {1f8184a2-14de-11df-9734-f08c6d8c50b0} displayorder {8ecb1e79-e971-11ee-9338-2079188d02a6} {8ecb1e78-e971-11ee-9338-2079188d02a6} {8ecb1e76-e971-11ee-9338-2079188d02a6} {8ecb1e77-e971-11ee-9338-2079188d02a6} {current} {c1c7020a-e972-11ee-9338-2079188d02a6} {c1c7020c-e972-11ee-9338-2079188d02a6} {c1c70208-e972-11ee-9338-2079188d02a6} toolsdisplayorder {memdiag} timeout 30 displaybootmenu Yes

Firmware Application (101fffff)

identifier {8ecb1e79-e971-11ee-9338-2079188d02a6} description Onboard NIC(IPV6) isolatedcontext Yes

Firmware Application (101fffff)

identifier {8ecb1e78-e971-11ee-9338-2079188d02a6} description Onboard NIC(IPV4) isolatedcontext Yes

Windows Boot Loader

identifier {current} device partition=C: path \Windows\system32\winload.efi description Windows 7 locale ms-MY isolatedcontext Yes osdevice partition=C: systemroot \Windows resumeobject {453059b7-e973-11ee-9339-806e6f6e6963} nx OptIn bootmenupolicy Legacy

Windows Boot Loader

identifier {c1c7020a-e972-11ee-9338-2079188d02a6} device ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6} path \Windows\System32\Boot\winload.efi description Anhdv 24 Windows 11 PE locale en-US isolatedcontext Yes osdevice ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6} systemroot \Windows nx OptIn detecthal Yes winpe Yes

Windows Boot Loader

identifier {c1c7020c-e972-11ee-9338-2079188d02a6} device ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6} path \Windows\System32\Boot\winload.efi description Anhdv 21 Windows 10 PE locale en-US isolatedcontext Yes osdevice ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6} systemroot \Windows nx OptIn detecthal Yes winpe Yes

Windows Boot Loader

identifier {c1c70208-e972-11ee-9338-2079188d02a6} device ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6} path \Windows\System32\Boot\winload.efi description WinRE locale es-MX isolatedcontext Yes osdevice ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6} systemroot \Windows nx OptIn detecthal Yes winpe Yes

The log:

2024-03-23 20:33:48.983 | pid 6512 | HackBGRT installer version: v2.4.0 2024-03-23 20:33:48.983 | pid 6512 | Args: 2024-03-23 20:33:48.999 | pid 6512 | Your OS uses arch=x64. This will be checked again during installation. 2024-03-23 20:33:48.999 | pid 6512 | 2024-03-23 20:33:48.999 | pid 6512 | Choose action (press a key): 2024-03-23 20:33:48.999 | pid 6512 | I = install 2024-03-23 20:33:48.999 | pid 6512 | - creates a new EFI boot entry for HackBGRT 2024-03-23 20:33:48.999 | pid 6512 | J = install (alternative) 2024-03-23 20:33:48.999 | pid 6512 | - creates a new EFI boot entry with an alternative method 2024-03-23 20:33:48.999 | pid 6512 | - try this if the first option doesn't work 2024-03-23 20:33:48.999 | pid 6512 | O = install (legacy) 2024-03-23 20:33:48.999 | pid 6512 | - overwrites the MS boot loader; gets removed by Windows updates 2024-03-23 20:33:48.999 | pid 6512 | - use as last resort; may brick your system if configured incorrectly 2024-03-23 20:33:48.999 | pid 6512 | F = install files only 2024-03-23 20:33:48.999 | pid 6512 | - ok for updating config, doesn't touch boot entries 2024-03-23 20:33:48.999 | pid 6512 | D = disable 2024-03-23 20:33:48.999 | pid 6512 | - removes created entries, restores MS boot loader 2024-03-23 20:33:48.999 | pid 6512 | R = remove completely 2024-03-23 20:33:48.999 | pid 6512 | - disables, then deletes all files and images 2024-03-23 20:33:48.999 | pid 6512 | B = boot to UEFI setup 2024-03-23 20:33:48.999 | pid 6512 | - lets you disable Secure Boot 2024-03-23 20:33:48.999 | pid 6512 | - lets you move HackBGRT before Windows in boot order 2024-03-23 20:33:48.999 | pid 6512 | L = show boot log (what HackBGRT did during boot) 2024-03-23 20:33:48.999 | pid 6512 | C = cancel 2024-03-23 20:33:50.198 | pid 6512 | User input: J 2024-03-23 20:33:50.198 | pid 6512 | 2024-03-23 20:33:50.198 | pid 6512 | This setup program lets you edit just one image. 2024-03-23 20:33:50.198 | pid 6512 | Edit config.txt manually for advanced configuration. 2024-03-23 20:33:50.198 | pid 6512 | Draw or copy your preferred image to splash.bmp. 2024-03-23 20:33:50.198 | pid 6512 | StartProcess: mspaint splash.bmp 2024-03-23 20:33:51.539 | pid 6512 | 2024-03-23 20:33:51.550 | pid 6512 | RunPrivilegedActions: install disable enable-entry 2024-03-23 20:33:51.551 | pid 6512 | RunElevated: C:\Users\Alcatel\Desktop\HackBGRT-2.4.0\setup.exe is-elevated install disable enable-entry 2024-03-23 20:33:53.505 | pid 1144 | HackBGRT installer version: v2.4.0 2024-03-23 20:33:53.505 | pid 1144 | Args: is-elevated install disable enable-entry 2024-03-23 20:33:53.505 | pid 1144 | Your OS uses arch=x64. This will be checked again during installation. 2024-03-23 20:33:53.520 | pid 1144 | RunPrivilegedActions: install disable enable-entry 2024-03-23 20:33:53.520 | pid 1144 | Esp.Find() 2024-03-23 20:33:53.520 | pid 1144 | Execute: mountvol 2024-03-23 20:33:53.708 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:53.708 | pid 1144 | Creates, deletes, or lists a volume mount point. 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path VolumeName 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path /D 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path /L 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path /P 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL /R 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL /N 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL /E 2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL drive: /S 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | path Specifies the existing NTFS directory where the mount 2024-03-23 20:33:53.708 | pid 1144 | point will reside. 2024-03-23 20:33:53.708 | pid 1144 | VolumeName Specifies the volume name that is the target of the mount 2024-03-23 20:33:53.708 | pid 1144 | point. 2024-03-23 20:33:53.708 | pid 1144 | /D Removes the volume mount point from the specified directory. 2024-03-23 20:33:53.708 | pid 1144 | /L Lists the mounted volume name for the specified directory. 2024-03-23 20:33:53.708 | pid 1144 | /P Removes the volume mount point from the specified directory, 2024-03-23 20:33:53.708 | pid 1144 | dismounts the volume, and makes the volume not mountable. 2024-03-23 20:33:53.708 | pid 1144 | You can make the volume mountable again by creating a volume 2024-03-23 20:33:53.708 | pid 1144 | mount point. 2024-03-23 20:33:53.708 | pid 1144 | /R Removes volume mount point directories and registry settings 2024-03-23 20:33:53.708 | pid 1144 | for volumes that are no longer in the system. 2024-03-23 20:33:53.708 | pid 1144 | /N Disables automatic mounting of new volumes. 2024-03-23 20:33:53.708 | pid 1144 | /E Re-enables automatic mounting of new volumes. 2024-03-23 20:33:53.708 | pid 1144 | /S Mount the EFI System Partition on the given drive. 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | Possible values for VolumeName along with current mount points are: 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{adcb3ea4-9ce8-4e9b-80f1-bc0bcb6cc116}\ 2024-03-23 20:33:53.708 | pid 1144 | C:\ 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{62a844e6-96e1-4079-aebe-f565465dc2d8}\ 2024-03-23 20:33:53.708 | pid 1144 | D:\ 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{3795b565-3504-48d4-b468-484e15e5def7}\ 2024-03-23 20:33:53.708 | pid 1144 | E:\ 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{ab1f7ab5-c3ca-4d1a-a1fd-a1720bf27d0c}\ 2024-03-23 20:33:53.708 | pid 1144 | NO MOUNT POINTS 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | The EFI System Partition is mounted at A:\ 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | Esp.TryPath: A:\ has MS boot loader 2024-03-23 20:33:53.708 | pid 1144 | EFI System Partition location is A:\ 2024-03-23 20:33:53.708 | pid 1144 | Detected arch=x64 from MS boot loader, the installer will use that. 2024-03-23 20:33:53.708 | pid 1144 | 2024-03-23 20:33:53.708 | pid 1144 | --- BOOT LOG START --- 2024-03-23 20:33:53.708 | pid 1144 | (null) 2024-03-23 20:33:53.708 | pid 1144 | --- BOOT LOG END --- 2024-03-23 20:33:53.708 | pid 1144 | LogBGRT: 56 bytes: 42 47 52 54 38 00 00 00 00 CD 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 20 07 01 41 4D 49 20 13 00 01 00 01 00 00 00 18 B0 C9 4F 00 00 00 00 E9 02 00 00 C4 00 00 00 2024-03-23 20:33:53.708 | pid 1144 | LogBootOrder: BootOrder Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' ' Bytes='17 00 16 00 18 00 19 00' 2024-03-23 20:33:53.708 | pid 1144 | LogBootOrder: BootCurrent Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=6 Text=' ' Bytes='19 00' 2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0017 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' O n b o a r d N I C ( I P V 6 ) A % P < @  v Gd- ; A MQ L P X E I P 6 I n t e l ( R ) E t h e r n e t C o n n e c t i o n ( 7 ) I 2 1 9 - L M  BO' Bytes='00 00 00 00 F1 00 4F 00 6E 00 62 00 6F 00 61 00 72 00 64 00 20 00 4E 00 49 00 43 00 28 00 49 00 50 00 56 00 36 00 29 00 00 00 02 01 0C 00 D0 41 03 0A 00 00 00 00 01 01 06 00 06 1F 03 0B 25 00 C8 F7 50 0C A4 FC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 0D 3C 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7F FF 04 00 01 04 76 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 50 00 58 00 45 00 20 00 49 00 50 00 36 00 20 00 49 00 6E 00 74 00 65 00 6C 00 28 00 52 00 29 00 20 00 45 00 74 00 68 00 65 00 72 00 6E 00 65 00 74 00 20 00 43 00 6F 00 6E 00 6E 00 65 00 63 00 74 00 69 00 6F 00 6E 00 20 00 28 00 37 00 29 00 20 00 49 00 32 00 31 00 39 00 2D 00 4C 00 4D 00 00 00 7F FF 04 00 00 00 42 4F' 2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0016 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' O n b o a r d N I C ( I P V 4 ) A % P  v Gd- ; A MQ L P X E I P 4 I n t e l ( R ) E t h e r n e t C o n n e c t i o n ( 7 ) I 2 1 9 - L M  BO' Bytes='00 00 00 00 D0 00 4F 00 6E 00 62 00 6F 00 61 00 72 00 64 00 20 00 4E 00 49 00 43 00 28 00 49 00 50 00 56 00 34 00 29 00 00 00 02 01 0C 00 D0 41 03 0A 00 00 00 00 01 01 06 00 06 1F 03 0B 25 00 C8 F7 50 0C A4 FC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 0C 1B 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7F FF 04 00 01 04 76 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 50 00 58 00 45 00 20 00 49 00 50 00 34 00 20 00 49 00 6E 00 74 00 65 00 6C 00 28 00 52 00 29 00 20 00 45 00 74 00 68 00 65 00 72 00 6E 00 65 00 74 00 20 00 43 00 6F 00 6E 00 6E 00 65 00 63 00 74 00 69 00 6F 00 6E 00 20 00 28 00 37 00 29 00 20 00 49 00 32 00 31 00 39 00 2D 00 4C 00 4D 00 00 00 7F FF 04 00 00 00 42 4F' 2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0018 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' U E F I : P C 4 0 1 N V M e S K h y n i x 1 T B , P a r t i t i o n 4 v D b y@ eF] 0 \ E F I \ b o o t \ b o o t x 6 4 . e f i  8 Gd- ; A MQ L M N 8 B N 1 6 2 9 1 0 3 0 B L 2 R  BO' Bytes='00 00 00 00 9A 00 55 00 45 00 46 00 49 00 3A 00 20 00 50 00 43 00 34 00 30 00 31 00 20 00 4E 00 56 00 4D 00 65 00 20 00 53 00 4B 00 20 00 68 00 79 00 6E 00 69 00 78 00 20 00 31 00 54 00 42 00 2C 00 20 00 50 00 61 00 72 00 74 00 69 00 74 00 69 00 6F 00 6E 00 20 00 34 00 00 00 04 01 2A 00 04 00 00 00 00 B0 99 76 00 00 00 00 00 00 80 00 00 00 00 00 E6 44 A8 62 E1 96 79 40 AE BE F5 65 46 5D C2 D8 02 02 04 04 30 00 5C 00 45 00 46 00 49 00 5C 00 62 00 6F 00 6F 00 74 00 5C 00 62 00 6F 00 6F 00 74 00 78 00 36 00 34 00 2E 00 65 00 66 00 69 00 00 00 7F FF 04 00 01 04 38 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 4D 00 4E 00 38 00 42 00 4E 00 31 00 36 00 32 00 39 00 31 00 30 00 33 00 30 00 42 00 4C 00 32 00 52 00 00 00 7F FF 04 00 00 00 42 4F' 2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0019 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' U E F I : P C 4 0 1 N V M e S K h y n i x 1 T B , P a r t i t i o n 6 d w E z M r } F \ E F I \ M i c r o s o f t \ B o o t \ b o o t m g f w . e f i  8 Gd- ; A MQ L M N 8 B N 1 6 2 9 1 0 3 0 B L 2 R  BO' Bytes='01 00 00 00 B0 00 55 00 45 00 46 00 49 00 3A 00 20 00 50 00 43 00 34 00 30 00 31 00 20 00 4E 00 56 00 4D 00 65 00 20 00 53 00 4B 00 20 00 68 00 79 00 6E 00 69 00 78 00 20 00 31 00 54 00 42 00 2C 00 20 00 50 00 61 00 72 00 74 00 69 00 74 00 69 00 6F 00 6E 00 20 00 36 00 00 00 04 01 2A 00 06 00 00 00 64 FA 2A 77 00 00 00 00 9C 45 03 00 00 00 00 00 B5 7A 1F AB CA C3 1A 4D A1 FD A1 72 0B F2 7D 0C 02 02 04 04 46 00 5C 00 45 00 46 00 49 00 5C 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 5C 00 42 00 6F 00 6F 00 74 00 5C 00 62 00 6F 00 6F 00 74 00 6D 00 67 00 66 00 77 00 2E 00 65 00 66 00 69 00 00 00 7F FF 04 00 01 04 38 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 4D 00 4E 00 38 00 42 00 4E 00 31 00 36 00 32 00 39 00 31 00 30 00 33 00 30 00 42 00 4C 00 32 00 52 00 00 00 7F FF 04 00 00 00 42 4F' 2024-03-23 20:33:53.880 | pid 1144 | Boot time = 23/03/2024 20:31:42, config.txt changed = 23/03/2024 19:45:38 2024-03-23 20:33:53.880 | pid 1144 | You may have to disable Fast Startup (Hiberboot) to reboot properly. 2024-03-23 20:33:53.880 | pid 1144 | Running action 'install'. 2024-03-23 20:33:53.918 | pid 1144 | Installed config.txt to A:\EFI\HackBGRT\config.txt. 2024-03-23 20:33:53.918 | pid 1144 | config.txt: 2024-03-23 20:33:53.918 | pid 1144 | # vim: set fileencoding=utf-8 2024-03-23 20:33:53.918 | pid 1144 | # The same options may be given also as command line parameters in the EFI Shell, which is useful for debugging. 2024-03-23 20:33:53.918 | pid 1144 | 2024-03-23 20:33:53.918 | pid 1144 | # Boot loader path. MS = either backup or original Windows boot loader. 2024-03-23 20:33:53.918 | pid 1144 | boot=MS 2024-03-23 20:33:53.918 | pid 1144 | 2024-03-23 20:33:53.918 | pid 1144 | # The image is specified with an image line. 2024-03-23 20:33:53.918 | pid 1144 | # Multiple image lines may be present, in which case one will be picked by random. 2024-03-23 20:33:53.918 | pid 1144 | # The image line may contain the following parts: 2024-03-23 20:33:53.918 | pid 1144 | # Any of the following: 2024-03-23 20:33:53.918 | pid 1144 | # - "n=(number)", a weight for this image in the randomization process. Default: n=1. 2024-03-23 20:33:53.918 | pid 1144 | # - "x=(number)" or "x=keep", the x offset from the center. Default: x=0. 2024-03-23 20:33:53.918 | pid 1144 | # - "y=(number)" or "y=keep", the y offset from the center. Default: y=0. 2024-03-23 20:33:53.918 | pid 1144 | # - "o=(0|90|180|270|keep)", the screen orientation, degrees anticlockwise. Default: o=keep. 2024-03-23 20:33:53.918 | pid 1144 | # One of the following: 2024-03-23 20:33:53.918 | pid 1144 | # - "keep" to keep the firmware logo. Also keeps coordinates by default. 2024-03-23 20:33:53.918 | pid 1144 | # - "remove" to remove the BGRT. Makes x and y meaningless. 2024-03-23 20:33:53.918 | pid 1144 | # - "black" to use only a black image. Makes x and y meaningless. 2024-03-23 20:33:53.918 | pid 1144 | # - "path=file.bmp" to read an image file. 2024-03-23 20:33:53.918 | pid 1144 | # NOTE: The installer can copy and convert BMP, PNG, JPEG, GIF. 2024-03-23 20:33:53.918 | pid 1144 | # Examples: 2024-03-23 20:33:53.918 | pid 1144 | # - image=remove 2024-03-23 20:33:53.918 | pid 1144 | # - image=black 2024-03-23 20:33:53.918 | pid 1144 | # - image= x=0 y=-200 path=topimage.bmp 2024-03-23 20:33:53.918 | pid 1144 | # - image= n=1 o=90 path=sideways.bmp 2024-03-23 20:33:53.918 | pid 1144 | # - image= n=50 y=999999 o=keep path=probable.bmp 2024-03-23 20:33:53.918 | pid 1144 | # The above examples together would produce 2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for the default OS logo 2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for black screen 2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for topimage.bmp, 200 px above the center of the screen 2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for splash.bmp, centered, orientation set to 90 degrees 2024-03-23 20:33:53.918 | pid 1144 | # - 50/54 chance for probable.bmp, at the bottom edge, explicitly default orientation 2024-03-23 20:33:53.918 | pid 1144 | # Default: just one image. 2024-03-23 20:33:53.918 | pid 1144 | image= y=-200 path=splash.bmp 2024-03-23 20:33:53.918 | pid 1144 | 2024-03-23 20:33:53.918 | pid 1144 | # Preferred resolution. Use 0x0 for maximum and -1x-1 for original. 2024-03-23 20:33:53.918 | pid 1144 | resolution=0x0 2024-03-23 20:33:53.918 | pid 1144 | 2024-03-23 20:33:53.918 | pid 1144 | # Logging (0 for disabled, 1 for enabled). 2024-03-23 20:33:53.918 | pid 1144 | # When logging is enabled, setup.exe can show debug information about the current boot. 2024-03-23 20:33:53.918 | pid 1144 | # The log might occupy a few kilobytes of RAM. 2024-03-23 20:33:53.918 | pid 1144 | log=1 2024-03-23 20:33:53.918 | pid 1144 | 2024-03-23 20:33:53.918 | pid 1144 | # Debug mode (0 for disabled, 1 for enabled). 2024-03-23 20:33:53.918 | pid 1144 | # Shows debug information and prompts for keypress before booting. 2024-03-23 20:33:53.918 | pid 1144 | debug=0 2024-03-23 20:33:53.933 | pid 1144 | InstallImageFile: splash.bmp 2024-03-23 20:33:53.949 | pid 1144 | Installed image splash.bmp to A:\EFI\HackBGRT\splash.bmp. 2024-03-23 20:33:53.949 | pid 1144 | Installed shim-signed\shimx64.efi to A:\EFI\HackBGRT\loader.efi. 2024-03-23 20:33:53.949 | pid 1144 | Installed shim-signed\mmx64.efi to A:\EFI\HackBGRT\mmx64.efi. 2024-03-23 20:33:53.949 | pid 1144 | Installed efi-signed\bootx64.efi to A:\EFI\HackBGRT\grubx64.efi. 2024-03-23 20:33:53.949 | pid 1144 | Installed efi-signed\bootx64.efi to A:\EFI\HackBGRT\䥗䑎坏SX. 2024-03-23 20:33:53.965 | pid 1144 | Installed certificate.cer to A:\EFI\HackBGRT\certificate.cer. 2024-03-23 20:33:53.965 | pid 1144 | HackBGRT has been copied to A:\EFI\HackBGRT. 2024-03-23 20:33:53.965 | pid 1144 | On first boot, select 'Enroll hash from disk' and enroll EFI\HackBGRT\grubx64.efi. 2024-03-23 20:33:53.965 | pid 1144 | Alternatively, select 'Enroll key from disk' and enroll EFI\HackBGRT\certificate.cer. 2024-03-23 20:33:53.965 | pid 1144 | Completed action 'install' successfully. 2024-03-23 20:33:53.965 | pid 1144 | Running action 'disable'. 2024-03-23 20:33:54.183 | pid 1144 | DetectLoader failed: A:\EFI\HackBGRT\bootmgfw-original.efi not found 2024-03-23 20:33:54.183 | pid 1144 | Execute: bcdedit /enum firmware 2024-03-23 20:33:54.554 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | Firmware Boot Manager 2024-03-23 20:33:54.554 | pid 1144 | --------------------- 2024-03-23 20:33:54.554 | pid 1144 | identifier {fwbootmgr} 2024-03-23 20:33:54.554 | pid 1144 | displayorder {8ecb1e79-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e78-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {fa6e64f8-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:54.554 | pid 1144 | {fa6e64f9-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:54.554 | pid 1144 | timeout 0 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | Windows Boot Manager 2024-03-23 20:33:54.554 | pid 1144 | -------------------- 2024-03-23 20:33:54.554 | pid 1144 | identifier {bootmgr} 2024-03-23 20:33:54.554 | pid 1144 | device boot 2024-03-23 20:33:54.554 | pid 1144 | description Windows Boot Manager 2024-03-23 20:33:54.554 | pid 1144 | locale es-ES 2024-03-23 20:33:54.554 | pid 1144 | inherit {globalsettings} 2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:54.554 | pid 1144 | default {current} 2024-03-23 20:33:54.554 | pid 1144 | resumeobject {1f8184a2-14de-11df-9734-f08c6d8c50b0} 2024-03-23 20:33:54.554 | pid 1144 | displayorder {8ecb1e79-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e78-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e76-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e77-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {current} 2024-03-23 20:33:54.554 | pid 1144 | {c1c7020a-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {c1c7020c-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | {c1c70208-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | toolsdisplayorder {memdiag} 2024-03-23 20:33:54.554 | pid 1144 | timeout 30 2024-03-23 20:33:54.554 | pid 1144 | displaybootmenu Yes 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:54.554 | pid 1144 | ------------------------------- 2024-03-23 20:33:54.554 | pid 1144 | identifier {8ecb1e78-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | description Onboard NIC(IPV4) 2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:54.554 | pid 1144 | ------------------------------- 2024-03-23 20:33:54.554 | pid 1144 | identifier {8ecb1e79-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.554 | pid 1144 | description Onboard NIC(IPV6) 2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:54.554 | pid 1144 | ------------------------------- 2024-03-23 20:33:54.554 | pid 1144 | identifier {fa6e64f8-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:54.554 | pid 1144 | device partition=D: 2024-03-23 20:33:54.554 | pid 1144 | path \EFI\boot\bootx64.efi 2024-03-23 20:33:54.554 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 4 2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:54.554 | pid 1144 | ------------------------------- 2024-03-23 20:33:54.554 | pid 1144 | identifier {fa6e64f9-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:54.554 | pid 1144 | device partition=A: 2024-03-23 20:33:54.554 | pid 1144 | path \EFI\Microsoft\Boot\bootmgfw.efi 2024-03-23 20:33:54.554 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 6 2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | 2024-03-23 20:33:54.554 | pid 1144 | Execute: bcdedit /enum {8ecb1e79-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.815 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:54.815 | pid 1144 | 2024-03-23 20:33:54.815 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:54.815 | pid 1144 | ------------------------------- 2024-03-23 20:33:54.815 | pid 1144 | identifier {8ecb1e79-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:54.815 | pid 1144 | description Onboard NIC(IPV6) 2024-03-23 20:33:54.815 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:54.815 | pid 1144 | 2024-03-23 20:33:54.815 | pid 1144 | 2024-03-23 20:33:54.815 | pid 1144 | 2024-03-23 20:33:54.815 | pid 1144 | Execute: bcdedit /enum {8ecb1e78-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:55.081 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:55.081 | pid 1144 | 2024-03-23 20:33:55.081 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:55.081 | pid 1144 | ------------------------------- 2024-03-23 20:33:55.081 | pid 1144 | identifier {8ecb1e78-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:55.081 | pid 1144 | description Onboard NIC(IPV4) 2024-03-23 20:33:55.081 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:55.081 | pid 1144 | 2024-03-23 20:33:55.081 | pid 1144 | 2024-03-23 20:33:55.081 | pid 1144 | 2024-03-23 20:33:55.081 | pid 1144 | Execute: bcdedit /enum {fa6e64f8-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:55.346 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:55.346 | pid 1144 | 2024-03-23 20:33:55.346 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:55.346 | pid 1144 | ------------------------------- 2024-03-23 20:33:55.346 | pid 1144 | identifier {fa6e64f8-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:55.346 | pid 1144 | device partition=D: 2024-03-23 20:33:55.346 | pid 1144 | path \EFI\boot\bootx64.efi 2024-03-23 20:33:55.346 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 4 2024-03-23 20:33:55.346 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:55.346 | pid 1144 | 2024-03-23 20:33:55.346 | pid 1144 | 2024-03-23 20:33:55.346 | pid 1144 | 2024-03-23 20:33:55.346 | pid 1144 | Execute: bcdedit /enum {fa6e64f9-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:55.618 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:55.618 | pid 1144 | 2024-03-23 20:33:55.618 | pid 1144 | Firmware Application (101fffff) 2024-03-23 20:33:55.618 | pid 1144 | ------------------------------- 2024-03-23 20:33:55.618 | pid 1144 | identifier {fa6e64f9-e918-11ee-a402-806e6f6e6963} 2024-03-23 20:33:55.618 | pid 1144 | device partition=A: 2024-03-23 20:33:55.618 | pid 1144 | path \EFI\Microsoft\Boot\bootmgfw.efi 2024-03-23 20:33:55.618 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 6 2024-03-23 20:33:55.618 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:55.618 | pid 1144 | 2024-03-23 20:33:55.618 | pid 1144 | 2024-03-23 20:33:55.618 | pid 1144 | 2024-03-23 20:33:55.618 | pid 1144 | Execute: bcdedit /enum {1f8184a2-14de-11df-9734-f08c6d8c50b0} 2024-03-23 20:33:55.884 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:55.884 | pid 1144 | There are no matching objects or the store is empty. 2024-03-23 20:33:55.884 | pid 1144 | 2024-03-23 20:33:55.884 | pid 1144 | 2024-03-23 20:33:55.884 | pid 1144 | 2024-03-23 20:33:55.884 | pid 1144 | Execute: bcdedit /enum {8ecb1e76-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.150 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:56.150 | pid 1144 | There are no matching objects or the store is empty. 2024-03-23 20:33:56.150 | pid 1144 | 2024-03-23 20:33:56.150 | pid 1144 | 2024-03-23 20:33:56.150 | pid 1144 | 2024-03-23 20:33:56.150 | pid 1144 | Execute: bcdedit /enum {8ecb1e77-e971-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.416 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:56.416 | pid 1144 | There are no matching objects or the store is empty. 2024-03-23 20:33:56.416 | pid 1144 | 2024-03-23 20:33:56.416 | pid 1144 | 2024-03-23 20:33:56.416 | pid 1144 | 2024-03-23 20:33:56.416 | pid 1144 | Execute: bcdedit /enum {c1c7020a-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.697 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:56.697 | pid 1144 | 2024-03-23 20:33:56.697 | pid 1144 | Windows Boot Loader 2024-03-23 20:33:56.697 | pid 1144 | ------------------- 2024-03-23 20:33:56.697 | pid 1144 | identifier {c1c7020a-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.697 | pid 1144 | device ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.697 | pid 1144 | path \Windows\System32\Boot\winload.efi 2024-03-23 20:33:56.697 | pid 1144 | description Anhdv 24 Windows 11 PE 2024-03-23 20:33:56.697 | pid 1144 | locale en-US 2024-03-23 20:33:56.697 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:56.697 | pid 1144 | osdevice ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.697 | pid 1144 | systemroot \Windows 2024-03-23 20:33:56.697 | pid 1144 | nx OptIn 2024-03-23 20:33:56.697 | pid 1144 | detecthal Yes 2024-03-23 20:33:56.697 | pid 1144 | winpe Yes 2024-03-23 20:33:56.697 | pid 1144 | 2024-03-23 20:33:56.697 | pid 1144 | 2024-03-23 20:33:56.697 | pid 1144 | 2024-03-23 20:33:56.697 | pid 1144 | Execute: bcdedit /enum {c1c7020c-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.962 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:56.962 | pid 1144 | 2024-03-23 20:33:56.962 | pid 1144 | Windows Boot Loader 2024-03-23 20:33:56.962 | pid 1144 | ------------------- 2024-03-23 20:33:56.962 | pid 1144 | identifier {c1c7020c-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.962 | pid 1144 | device ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.962 | pid 1144 | path \Windows\System32\Boot\winload.efi 2024-03-23 20:33:56.962 | pid 1144 | description Anhdv 21 Windows 10 PE 2024-03-23 20:33:56.962 | pid 1144 | locale en-US 2024-03-23 20:33:56.962 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:56.962 | pid 1144 | osdevice ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:56.962 | pid 1144 | systemroot \Windows 2024-03-23 20:33:56.962 | pid 1144 | nx OptIn 2024-03-23 20:33:56.962 | pid 1144 | detecthal Yes 2024-03-23 20:33:56.962 | pid 1144 | winpe Yes 2024-03-23 20:33:56.962 | pid 1144 | 2024-03-23 20:33:56.962 | pid 1144 | 2024-03-23 20:33:56.962 | pid 1144 | 2024-03-23 20:33:56.962 | pid 1144 | Execute: bcdedit /enum {c1c70208-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:57.256 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:57.256 | pid 1144 | 2024-03-23 20:33:57.256 | pid 1144 | Windows Boot Loader 2024-03-23 20:33:57.256 | pid 1144 | ------------------- 2024-03-23 20:33:57.256 | pid 1144 | identifier {c1c70208-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:57.256 | pid 1144 | device ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:57.256 | pid 1144 | path \Windows\System32\Boot\winload.efi 2024-03-23 20:33:57.256 | pid 1144 | description WinRE 2024-03-23 20:33:57.256 | pid 1144 | locale es-MX 2024-03-23 20:33:57.256 | pid 1144 | isolatedcontext Yes 2024-03-23 20:33:57.256 | pid 1144 | osdevice ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6} 2024-03-23 20:33:57.256 | pid 1144 | systemroot \Windows 2024-03-23 20:33:57.256 | pid 1144 | nx OptIn 2024-03-23 20:33:57.256 | pid 1144 | detecthal Yes 2024-03-23 20:33:57.256 | pid 1144 | winpe Yes 2024-03-23 20:33:57.256 | pid 1144 | 2024-03-23 20:33:57.256 | pid 1144 | 2024-03-23 20:33:57.256 | pid 1144 | 2024-03-23 20:33:57.257 | pid 1144 | Read EFI variable: BootOrder Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' ' Bytes='17 00 16 00 18 00 19 00' 2024-03-23 20:33:57.268 | pid 1144 | Disabled NVRAM entry for HackBGRT. 2024-03-23 20:33:57.269 | pid 1144 | HackBGRT has been disabled. 2024-03-23 20:33:57.270 | pid 1144 | Completed action 'disable' successfully. 2024-03-23 20:33:57.270 | pid 1144 | Running action 'enable-entry'. 2024-03-23 20:33:57.271 | pid 1144 | Execute: manage-bde -status 2024-03-23 20:33:57.574 | pid 1144 | Exit code: 0, output: 2024-03-23 20:33:57.574 | pid 1144 | BitLocker Drive Encryption: Configuration Tool version 10.0.19041 2024-03-23 20:33:57.574 | pid 1144 | Copyright (C) 2013 Microsoft Corporation. All rights reserved. 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | Disk volumes that can be protected with 2024-03-23 20:33:57.574 | pid 1144 | BitLocker Drive Encryption: 2024-03-23 20:33:57.574 | pid 1144 | Volume C: [] 2024-03-23 20:33:57.574 | pid 1144 | [OS Volume] 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | Size: 948.20 GB 2024-03-23 20:33:57.574 | pid 1144 | BitLocker Version: 2.0 2024-03-23 20:33:57.574 | pid 1144 | Conversion Status: Fully Encrypted 2024-03-23 20:33:57.574 | pid 1144 | Percentage Encrypted: 100.0% 2024-03-23 20:33:57.574 | pid 1144 | Encryption Method: XTS-AES 128 2024-03-23 20:33:57.574 | pid 1144 | Protection Status: Protection On 2024-03-23 20:33:57.574 | pid 1144 | Lock Status: Unlocked 2024-03-23 20:33:57.574 | pid 1144 | Identification Field: Unknown 2024-03-23 20:33:57.574 | pid 1144 | Key Protectors: 2024-03-23 20:33:57.574 | pid 1144 | Numerical Password 2024-03-23 20:33:57.574 | pid 1144 | TPM And PIN 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | Volume D: [Anhdv] 2024-03-23 20:33:57.574 | pid 1144 | [Data Volume] 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | Size: 4.00 GB 2024-03-23 20:33:57.574 | pid 1144 | BitLocker Version: None 2024-03-23 20:33:57.574 | pid 1144 | Conversion Status: Fully Decrypted 2024-03-23 20:33:57.574 | pid 1144 | Percentage Encrypted: 0.0% 2024-03-23 20:33:57.574 | pid 1144 | Encryption Method: None 2024-03-23 20:33:57.574 | pid 1144 | Protection Status: Protection Off 2024-03-23 20:33:57.574 | pid 1144 | Lock Status: Unlocked 2024-03-23 20:33:57.574 | pid 1144 | Identification Field: None 2024-03-23 20:33:57.574 | pid 1144 | Automatic Unlock: Disabled 2024-03-23 20:33:57.574 | pid 1144 | Key Protectors: None Found 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | 2024-03-23 20:33:57.574 | pid 1144 | BitLocker is enabled. Make sure you have your recovery key! 2024-03-23 20:33:57.574 | pid 1144 | Choose action (press a key): 2024-03-23 20:33:57.574 | pid 1144 | I = Install anyway; THIS MAY BE DANGEROUS! 2024-03-23 20:33:57.574 | pid 1144 | C = Cancel 2024-03-23 20:33:59.556 | pid 1144 | User input: I 2024-03-23 20:33:59.556 | pid 1144 | 2024-03-23 20:33:59.556 | pid 1144 | Continuing. THIS MAY BE DANGEROUS! 2024-03-23 20:33:59.556 | pid 1144 | Read EFI variable: BootOrder Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' ' Bytes='17 00 16 00 18 00 19 00' 2024-03-23 20:33:59.556 | pid 1144 | Read EFI variable: BootCurrent Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=6 Text=' ' Bytes='19 00' 2024-03-23 20:33:59.696 | pid 1144 | 2024-03-23 20:33:59.696 | pid 1144 | Unexpected error: MakeBootEntry: Windows Boot Manager not found. 2024-03-23 20:33:59.696 | pid 1144 | System.Exception: MakeBootEntry: Windows Boot Manager not found. 2024-03-23 20:33:59.696 | pid 1144 | at Efi.MakeAndEnableBootEntry(String label, String fileName, Boolean alwaysCopyFromMS, Boolean dryRun) 2024-03-23 20:33:59.696 | pid 1144 | at Setup.EnableEntry() 2024-03-23 20:33:59.696 | pid 1144 | at Setup.<>cDisplayClass45_0.b2() 2024-03-23 20:33:59.696 | pid 1144 | at Setup.<>cDisplayClass45_0.b1(Action enable, Action revert) 2024-03-23 20:33:59.696 | pid 1144 | at Setup.RunPrivilegedActions(IEnumerable1 actions) 2024-03-23 20:33:59.696 | pid 1144 | at Setup.Run(String[] args) 2024-03-23 20:33:59.712 | pid 1144 | If this is the most current release, please report this bug. 2024-03-23 20:33:59.712 | pid 1144 | If you need to report a bug, 2024-03-23 20:33:59.712 | pid 1144 | - run this setup again with menu option L (show-boot-log) 2024-03-23 20:33:59.712 | pid 1144 | - then include the setup.log file with your report. 2024-03-23 20:33:59.712 | pid 1144 | Press any key to quit. 2024-03-23 20:34:01.660 | pid 6512 | 2024-03-23 20:34:01.660 | pid 6512 | Error: Privileged action (install disable enable-entry) failed! 2024-03-23 20:34:01.660 | pid 6512 | Setup+SetupException: Privileged action (install disable enable-entry) failed! 2024-03-23 20:34:01.660 | pid 6512 | at Setup.RunPrivilegedActions(IEnumerable1 actions) 2024-03-23 20:34:01.660 | pid 6512 | at Setup.ShowMenu() 2024-03-23 20:34:01.660 | pid 6512 | at Setup.Run(String[] args) 2024-03-23 20:34:01.660 | pid 6512 | If you need to report a bug, 2024-03-23 20:34:01.660 | pid 6512 | - run this setup again with menu option L (show-boot-log) 2024-03-23 20:34:01.660 | pid 6512 | - then include the setup.log file with your report. 2024-03-23 20:34:01.660 | pid 6512 | Press any key to quit.

Metabolix commented 5 months ago

The real BCD entries are actually not relevant. Unfortunately and somewhat misleadingly, BCDEdit is also used for configuring UEFI firmware entries and it shows them along with the BCD entries. The entry which boots Windows is the one pointing to bootmgfw.efi.

In your case, the entry looks more like a firmware generated fallback entry, at least it's not in the form created by Microsoft tools, and HackBGRT fails to detect it. Maybe I could change the logic for this, but in any case, HackBGRT doesn't create entries from nothing but relies on copying and modifying the Windows entry.

When you messed up your BCD, did you run the Startup Repair to fix it? I assume it would create the original UEFI entry.

Your log only shows the second install option (J). Did you try the first install option (I)?

It's better to attach the log and not copy-paste, it's very difficult to read this thread with such a long log attached.

Metabolix commented 5 months ago

I noticed now that Boot0019, which contains that bootmgfw.efi path, has some extra DevicePathNode components after the end-of-path marker. I will soon commit a patch to detect this somewhat unusual boot entry.