Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MakeBootEntry: Windows Boot Manager not found. #181

Closed
7kt4 opened this issue Mar 24, 2024 · 2 comments
Closed

MakeBootEntry: Windows Boot Manager not found. #181

7kt4 opened this issue Mar 24, 2024 · 2 comments

Comments

@7kt4
Copy link

7kt4 commented Mar 24, 2024

What happens?
Installation fails with the reason "Windows Boot Manager not found." Now what's weird is that reading the HackBGRT log, I don't see any mention of my Windows installation on the main drive, C:. I don't see its GUID in there either. But if I run bcdedit in cmd, it does show my Windows installation. The only thing I can think of is if HackBGRT is trying to read from a different BCD than the one for my system...but I'm not sure why that would be

How this happens?
Explain exactly the steps you did:

  1. HackBGRT didn't give me problems until today when I messed up my bootloader and I had to reconfigure my boot files.
  2. I just started with a fresh BCD and reconfigured from there

Log file

Before I put the log, I will put the output of bcdedit in a command prompt to compare it to:
C:\Windows\system32>bcdedit

Windows Boot Manager

identifier {bootmgr}
device boot
description Windows Boot Manager
locale es-ES
inherit {globalsettings}
isolatedcontext Yes
default {current}
resumeobject {1f8184a2-14de-11df-9734-f08c6d8c50b0}
displayorder {8ecb1e79-e971-11ee-9338-2079188d02a6}
{8ecb1e78-e971-11ee-9338-2079188d02a6}
{8ecb1e76-e971-11ee-9338-2079188d02a6}
{8ecb1e77-e971-11ee-9338-2079188d02a6}
{current}
{c1c7020a-e972-11ee-9338-2079188d02a6}
{c1c7020c-e972-11ee-9338-2079188d02a6}
{c1c70208-e972-11ee-9338-2079188d02a6}
toolsdisplayorder {memdiag}
timeout 30
displaybootmenu Yes

Firmware Application (101fffff)

identifier {8ecb1e79-e971-11ee-9338-2079188d02a6}
description Onboard NIC(IPV6)
isolatedcontext Yes

Firmware Application (101fffff)

identifier {8ecb1e78-e971-11ee-9338-2079188d02a6}
description Onboard NIC(IPV4)
isolatedcontext Yes

Windows Boot Loader

identifier {current}
device partition=C:
path \Windows\system32\winload.efi
description Windows 7
locale ms-MY
isolatedcontext Yes
osdevice partition=C:
systemroot \Windows
resumeobject {453059b7-e973-11ee-9339-806e6f6e6963}
nx OptIn
bootmenupolicy Legacy

Windows Boot Loader

identifier {c1c7020a-e972-11ee-9338-2079188d02a6}
device ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6}
path \Windows\System32\Boot\winload.efi
description Anhdv 24 Windows 11 PE
locale en-US
isolatedcontext Yes
osdevice ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6}
systemroot \Windows
nx OptIn
detecthal Yes
winpe Yes

Windows Boot Loader

identifier {c1c7020c-e972-11ee-9338-2079188d02a6}
device ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6}
path \Windows\System32\Boot\winload.efi
description Anhdv 21 Windows 10 PE
locale en-US
isolatedcontext Yes
osdevice ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6}
systemroot \Windows
nx OptIn
detecthal Yes
winpe Yes

Windows Boot Loader

identifier {c1c70208-e972-11ee-9338-2079188d02a6}
device ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6}
path \Windows\System32\Boot\winload.efi
description WinRE
locale es-MX
isolatedcontext Yes
osdevice ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6}
systemroot \Windows
nx OptIn
detecthal Yes
winpe Yes

The log:

2024-03-23 20:33:48.983 | pid 6512 | HackBGRT installer version: v2.4.0
2024-03-23 20:33:48.983 | pid 6512 | Args:
2024-03-23 20:33:48.999 | pid 6512 | Your OS uses arch=x64. This will be checked again during installation.
2024-03-23 20:33:48.999 | pid 6512 |
2024-03-23 20:33:48.999 | pid 6512 | Choose action (press a key):
2024-03-23 20:33:48.999 | pid 6512 | I = install
2024-03-23 20:33:48.999 | pid 6512 | - creates a new EFI boot entry for HackBGRT
2024-03-23 20:33:48.999 | pid 6512 | J = install (alternative)
2024-03-23 20:33:48.999 | pid 6512 | - creates a new EFI boot entry with an alternative method
2024-03-23 20:33:48.999 | pid 6512 | - try this if the first option doesn't work
2024-03-23 20:33:48.999 | pid 6512 | O = install (legacy)
2024-03-23 20:33:48.999 | pid 6512 | - overwrites the MS boot loader; gets removed by Windows updates
2024-03-23 20:33:48.999 | pid 6512 | - use as last resort; may brick your system if configured incorrectly
2024-03-23 20:33:48.999 | pid 6512 | F = install files only
2024-03-23 20:33:48.999 | pid 6512 | - ok for updating config, doesn't touch boot entries
2024-03-23 20:33:48.999 | pid 6512 | D = disable
2024-03-23 20:33:48.999 | pid 6512 | - removes created entries, restores MS boot loader
2024-03-23 20:33:48.999 | pid 6512 | R = remove completely
2024-03-23 20:33:48.999 | pid 6512 | - disables, then deletes all files and images
2024-03-23 20:33:48.999 | pid 6512 | B = boot to UEFI setup
2024-03-23 20:33:48.999 | pid 6512 | - lets you disable Secure Boot
2024-03-23 20:33:48.999 | pid 6512 | - lets you move HackBGRT before Windows in boot order
2024-03-23 20:33:48.999 | pid 6512 | L = show boot log (what HackBGRT did during boot)
2024-03-23 20:33:48.999 | pid 6512 | C = cancel
2024-03-23 20:33:50.198 | pid 6512 | User input: J
2024-03-23 20:33:50.198 | pid 6512 |
2024-03-23 20:33:50.198 | pid 6512 | This setup program lets you edit just one image.
2024-03-23 20:33:50.198 | pid 6512 | Edit config.txt manually for advanced configuration.
2024-03-23 20:33:50.198 | pid 6512 | Draw or copy your preferred image to splash.bmp.
2024-03-23 20:33:50.198 | pid 6512 | StartProcess: mspaint splash.bmp
2024-03-23 20:33:51.539 | pid 6512 |
2024-03-23 20:33:51.550 | pid 6512 | RunPrivilegedActions: install disable enable-entry
2024-03-23 20:33:51.551 | pid 6512 | RunElevated: C:\Users\Alcatel\Desktop\HackBGRT-2.4.0\setup.exe is-elevated install disable enable-entry
2024-03-23 20:33:53.505 | pid 1144 | HackBGRT installer version: v2.4.0
2024-03-23 20:33:53.505 | pid 1144 | Args: is-elevated install disable enable-entry
2024-03-23 20:33:53.505 | pid 1144 | Your OS uses arch=x64. This will be checked again during installation.
2024-03-23 20:33:53.520 | pid 1144 | RunPrivilegedActions: install disable enable-entry
2024-03-23 20:33:53.520 | pid 1144 | Esp.Find()
2024-03-23 20:33:53.520 | pid 1144 | Execute: mountvol
2024-03-23 20:33:53.708 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:53.708 | pid 1144 | Creates, deletes, or lists a volume mount point.
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path VolumeName
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path /D
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path /L
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL [drive:]path /P
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL /R
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL /N
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL /E
2024-03-23 20:33:53.708 | pid 1144 | MOUNTVOL drive: /S
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | path Specifies the existing NTFS directory where the mount
2024-03-23 20:33:53.708 | pid 1144 | point will reside.
2024-03-23 20:33:53.708 | pid 1144 | VolumeName Specifies the volume name that is the target of the mount
2024-03-23 20:33:53.708 | pid 1144 | point.
2024-03-23 20:33:53.708 | pid 1144 | /D Removes the volume mount point from the specified directory.
2024-03-23 20:33:53.708 | pid 1144 | /L Lists the mounted volume name for the specified directory.
2024-03-23 20:33:53.708 | pid 1144 | /P Removes the volume mount point from the specified directory,
2024-03-23 20:33:53.708 | pid 1144 | dismounts the volume, and makes the volume not mountable.
2024-03-23 20:33:53.708 | pid 1144 | You can make the volume mountable again by creating a volume
2024-03-23 20:33:53.708 | pid 1144 | mount point.
2024-03-23 20:33:53.708 | pid 1144 | /R Removes volume mount point directories and registry settings
2024-03-23 20:33:53.708 | pid 1144 | for volumes that are no longer in the system.
2024-03-23 20:33:53.708 | pid 1144 | /N Disables automatic mounting of new volumes.
2024-03-23 20:33:53.708 | pid 1144 | /E Re-enables automatic mounting of new volumes.
2024-03-23 20:33:53.708 | pid 1144 | /S Mount the EFI System Partition on the given drive.
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | Possible values for VolumeName along with current mount points are:
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{adcb3ea4-9ce8-4e9b-80f1-bc0bcb6cc116}
2024-03-23 20:33:53.708 | pid 1144 | C:
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{62a844e6-96e1-4079-aebe-f565465dc2d8}
2024-03-23 20:33:53.708 | pid 1144 | D:
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{3795b565-3504-48d4-b468-484e15e5def7}
2024-03-23 20:33:53.708 | pid 1144 | E:
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | \?\Volume{ab1f7ab5-c3ca-4d1a-a1fd-a1720bf27d0c}
2024-03-23 20:33:53.708 | pid 1144 | *** NO MOUNT POINTS ***
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | The EFI System Partition is mounted at A:
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | Esp.TryPath: A:\ has MS boot loader
2024-03-23 20:33:53.708 | pid 1144 | EFI System Partition location is A:
2024-03-23 20:33:53.708 | pid 1144 | Detected arch=x64 from MS boot loader, the installer will use that.
2024-03-23 20:33:53.708 | pid 1144 |
2024-03-23 20:33:53.708 | pid 1144 | --- BOOT LOG START ---
2024-03-23 20:33:53.708 | pid 1144 | (null)
2024-03-23 20:33:53.708 | pid 1144 | --- BOOT LOG END ---
2024-03-23 20:33:53.708 | pid 1144 | LogBGRT: 56 bytes: 42 47 52 54 38 00 00 00 00 CD 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 20 07 01 41 4D 49 20 13 00 01 00 01 00 00 00 18 B0 C9 4F 00 00 00 00 E9 02 00 00 C4 00 00 00
2024-03-23 20:33:53.708 | pid 1144 | LogBootOrder: BootOrder Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' ' Bytes='17 00 16 00 18 00 19 00'
2024-03-23 20:33:53.708 | pid 1144 | LogBootOrder: BootCurrent Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=6 Text=' ' Bytes='19 00'
2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0017 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' O n b o a r d N I C ( I P V 6 ) A % P < @ � v Gd- ; A MQ L P X E I P 6 I n t e l ( R ) E t h e r n e t C o n n e c t i o n ( 7 ) I 2 1 9 - L M � BO' Bytes='00 00 00 00 F1 00 4F 00 6E 00 62 00 6F 00 61 00 72 00 64 00 20 00 4E 00 49 00 43 00 28 00 49 00 50 00 56 00 36 00 29 00 00 00 02 01 0C 00 D0 41 03 0A 00 00 00 00 01 01 06 00 06 1F 03 0B 25 00 C8 F7 50 0C A4 FC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 0D 3C 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7F FF 04 00 01 04 76 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 50 00 58 00 45 00 20 00 49 00 50 00 36 00 20 00 49 00 6E 00 74 00 65 00 6C 00 28 00 52 00 29 00 20 00 45 00 74 00 68 00 65 00 72 00 6E 00 65 00 74 00 20 00 43 00 6F 00 6E 00 6E 00 65 00 63 00 74 00 69 00 6F 00 6E 00 20 00 28 00 37 00 29 00 20 00 49 00 32 00 31 00 39 00 2D 00 4C 00 4D 00 00 00 7F FF 04 00 00 00 42 4F'
2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0016 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' O n b o a r d N I C ( I P V 4 ) A % P � v Gd- ; A MQ L P X E I P 4 I n t e l ( R ) E t h e r n e t C o n n e c t i o n ( 7 ) I 2 1 9 - L M � BO' Bytes='00 00 00 00 D0 00 4F 00 6E 00 62 00 6F 00 61 00 72 00 64 00 20 00 4E 00 49 00 43 00 28 00 49 00 50 00 56 00 34 00 29 00 00 00 02 01 0C 00 D0 41 03 0A 00 00 00 00 01 01 06 00 06 1F 03 0B 25 00 C8 F7 50 0C A4 FC 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 0C 1B 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7F FF 04 00 01 04 76 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 50 00 58 00 45 00 20 00 49 00 50 00 34 00 20 00 49 00 6E 00 74 00 65 00 6C 00 28 00 52 00 29 00 20 00 45 00 74 00 68 00 65 00 72 00 6E 00 65 00 74 00 20 00 43 00 6F 00 6E 00 6E 00 65 00 63 00 74 00 69 00 6F 00 6E 00 20 00 28 00 37 00 29 00 20 00 49 00 32 00 31 00 39 00 2D 00 4C 00 4D 00 00 00 7F FF 04 00 00 00 42 4F'
2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0018 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' U E F I : P C 4 0 1 N V M e S K h y n i x 1 T B , P a r t i t i o n 4 * v D b y@ eF] 0 \ E F I \ b o o t \ b o o t x 6 4 . e f i � 8 Gd- ; A MQ L M N 8 B N 1 6 2 9 1 0 3 0 B L 2 R � BO' Bytes='00 00 00 00 9A 00 55 00 45 00 46 00 49 00 3A 00 20 00 50 00 43 00 34 00 30 00 31 00 20 00 4E 00 56 00 4D 00 65 00 20 00 53 00 4B 00 20 00 68 00 79 00 6E 00 69 00 78 00 20 00 31 00 54 00 42 00 2C 00 20 00 50 00 61 00 72 00 74 00 69 00 74 00 69 00 6F 00 6E 00 20 00 34 00 00 00 04 01 2A 00 04 00 00 00 00 B0 99 76 00 00 00 00 00 00 80 00 00 00 00 00 E6 44 A8 62 E1 96 79 40 AE BE F5 65 46 5D C2 D8 02 02 04 04 30 00 5C 00 45 00 46 00 49 00 5C 00 62 00 6F 00 6F 00 74 00 5C 00 62 00 6F 00 6F 00 74 00 78 00 36 00 34 00 2E 00 65 00 66 00 69 00 00 00 7F FF 04 00 01 04 38 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 4D 00 4E 00 38 00 42 00 4E 00 31 00 36 00 32 00 39 00 31 00 30 00 33 00 30 00 42 00 4C 00 32 00 52 00 00 00 7F FF 04 00 00 00 42 4F'
2024-03-23 20:33:53.723 | pid 1144 | LogBootOrder: Boot0019 Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' U E F I : P C 4 0 1 N V M e S K h y n i x 1 T B , P a r t i t i o n 6 * d *w E z M r } F \ E F I \ M i c r o s o f t \ B o o t \ b o o t m g f w . e f i � 8 Gd- ; A MQ L M N 8 B N 1 6 2 9 1 0 3 0 B L 2 R � BO' Bytes='01 00 00 00 B0 00 55 00 45 00 46 00 49 00 3A 00 20 00 50 00 43 00 34 00 30 00 31 00 20 00 4E 00 56 00 4D 00 65 00 20 00 53 00 4B 00 20 00 68 00 79 00 6E 00 69 00 78 00 20 00 31 00 54 00 42 00 2C 00 20 00 50 00 61 00 72 00 74 00 69 00 74 00 69 00 6F 00 6E 00 20 00 36 00 00 00 04 01 2A 00 06 00 00 00 64 FA 2A 77 00 00 00 00 9C 45 03 00 00 00 00 00 B5 7A 1F AB CA C3 1A 4D A1 FD A1 72 0B F2 7D 0C 02 02 04 04 46 00 5C 00 45 00 46 00 49 00 5C 00 4D 00 69 00 63 00 72 00 6F 00 73 00 6F 00 66 00 74 00 5C 00 42 00 6F 00 6F 00 74 00 5C 00 62 00 6F 00 6F 00 74 00 6D 00 67 00 66 00 77 00 2E 00 65 00 66 00 69 00 00 00 7F FF 04 00 01 04 38 00 EF 47 64 2D C9 3B A0 41 AC 19 4D 51 D0 1B 4C E6 4D 00 4E 00 38 00 42 00 4E 00 31 00 36 00 32 00 39 00 31 00 30 00 33 00 30 00 42 00 4C 00 32 00 52 00 00 00 7F FF 04 00 00 00 42 4F'
2024-03-23 20:33:53.880 | pid 1144 | Boot time = 23/03/2024 20:31:42, config.txt changed = 23/03/2024 19:45:38
2024-03-23 20:33:53.880 | pid 1144 | You may have to disable Fast Startup (Hiberboot) to reboot properly.
2024-03-23 20:33:53.880 | pid 1144 | Running action 'install'.
2024-03-23 20:33:53.918 | pid 1144 | Installed config.txt to A:\EFI\HackBGRT\config.txt.
2024-03-23 20:33:53.918 | pid 1144 | config.txt:
2024-03-23 20:33:53.918 | pid 1144 | # vim: set fileencoding=utf-8
2024-03-23 20:33:53.918 | pid 1144 | # The same options may be given also as command line parameters in the EFI Shell, which is useful for debugging.
2024-03-23 20:33:53.918 | pid 1144 |
2024-03-23 20:33:53.918 | pid 1144 | # Boot loader path. MS = either backup or original Windows boot loader.
2024-03-23 20:33:53.918 | pid 1144 | boot=MS
2024-03-23 20:33:53.918 | pid 1144 |
2024-03-23 20:33:53.918 | pid 1144 | # The image is specified with an image line.
2024-03-23 20:33:53.918 | pid 1144 | # Multiple image lines may be present, in which case one will be picked by random.
2024-03-23 20:33:53.918 | pid 1144 | # The image line may contain the following parts:
2024-03-23 20:33:53.918 | pid 1144 | # Any of the following:
2024-03-23 20:33:53.918 | pid 1144 | # - "n=(number)", a weight for this image in the randomization process. Default: n=1.
2024-03-23 20:33:53.918 | pid 1144 | # - "x=(number)" or "x=keep", the x offset from the center. Default: x=0.
2024-03-23 20:33:53.918 | pid 1144 | # - "y=(number)" or "y=keep", the y offset from the center. Default: y=0.
2024-03-23 20:33:53.918 | pid 1144 | # - "o=(0|90|180|270|keep)", the screen orientation, degrees anticlockwise. Default: o=keep.
2024-03-23 20:33:53.918 | pid 1144 | # One of the following:
2024-03-23 20:33:53.918 | pid 1144 | # - "keep" to keep the firmware logo. Also keeps coordinates by default.
2024-03-23 20:33:53.918 | pid 1144 | # - "remove" to remove the BGRT. Makes x and y meaningless.
2024-03-23 20:33:53.918 | pid 1144 | # - "black" to use only a black image. Makes x and y meaningless.
2024-03-23 20:33:53.918 | pid 1144 | # - "path=file.bmp" to read an image file.
2024-03-23 20:33:53.918 | pid 1144 | # * NOTE: The installer can copy and convert BMP, PNG, JPEG, GIF.
2024-03-23 20:33:53.918 | pid 1144 | # Examples:
2024-03-23 20:33:53.918 | pid 1144 | # - image=remove
2024-03-23 20:33:53.918 | pid 1144 | # - image=black
2024-03-23 20:33:53.918 | pid 1144 | # - image= x=0 y=-200 path=topimage.bmp
2024-03-23 20:33:53.918 | pid 1144 | # - image= n=1 o=90 path=sideways.bmp
2024-03-23 20:33:53.918 | pid 1144 | # - image= n=50 y=999999 o=keep path=probable.bmp
2024-03-23 20:33:53.918 | pid 1144 | # The above examples together would produce
2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for the default OS logo
2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for black screen
2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for topimage.bmp, 200 px above the center of the screen
2024-03-23 20:33:53.918 | pid 1144 | # - 1/54 chance for splash.bmp, centered, orientation set to 90 degrees
2024-03-23 20:33:53.918 | pid 1144 | # - 50/54 chance for probable.bmp, at the bottom edge, explicitly default orientation
2024-03-23 20:33:53.918 | pid 1144 | # Default: just one image.
2024-03-23 20:33:53.918 | pid 1144 | image= y=-200 path=splash.bmp
2024-03-23 20:33:53.918 | pid 1144 |
2024-03-23 20:33:53.918 | pid 1144 | # Preferred resolution. Use 0x0 for maximum and -1x-1 for original.
2024-03-23 20:33:53.918 | pid 1144 | resolution=0x0
2024-03-23 20:33:53.918 | pid 1144 |
2024-03-23 20:33:53.918 | pid 1144 | # Logging (0 for disabled, 1 for enabled).
2024-03-23 20:33:53.918 | pid 1144 | # When logging is enabled, setup.exe can show debug information about the current boot.
2024-03-23 20:33:53.918 | pid 1144 | # The log might occupy a few kilobytes of RAM.
2024-03-23 20:33:53.918 | pid 1144 | log=1
2024-03-23 20:33:53.918 | pid 1144 |
2024-03-23 20:33:53.918 | pid 1144 | # Debug mode (0 for disabled, 1 for enabled).
2024-03-23 20:33:53.918 | pid 1144 | # Shows debug information and prompts for keypress before booting.
2024-03-23 20:33:53.918 | pid 1144 | debug=0
2024-03-23 20:33:53.933 | pid 1144 | InstallImageFile: splash.bmp
2024-03-23 20:33:53.949 | pid 1144 | Installed image splash.bmp to A:\EFI\HackBGRT\splash.bmp.
2024-03-23 20:33:53.949 | pid 1144 | Installed shim-signed\shimx64.efi to A:\EFI\HackBGRT\loader.efi.
2024-03-23 20:33:53.949 | pid 1144 | Installed shim-signed\mmx64.efi to A:\EFI\HackBGRT\mmx64.efi.
2024-03-23 20:33:53.949 | pid 1144 | Installed efi-signed\bootx64.efi to A:\EFI\HackBGRT\grubx64.efi.
2024-03-23 20:33:53.949 | pid 1144 | Installed efi-signed\bootx64.efi to A:\EFI\HackBGRT\䥗䑎坏SX.
2024-03-23 20:33:53.965 | pid 1144 | Installed certificate.cer to A:\EFI\HackBGRT\certificate.cer.
2024-03-23 20:33:53.965 | pid 1144 | HackBGRT has been copied to A:\EFI\HackBGRT.
2024-03-23 20:33:53.965 | pid 1144 | On first boot, select 'Enroll hash from disk' and enroll EFI\HackBGRT\grubx64.efi.
2024-03-23 20:33:53.965 | pid 1144 | Alternatively, select 'Enroll key from disk' and enroll EFI\HackBGRT\certificate.cer.
2024-03-23 20:33:53.965 | pid 1144 | Completed action 'install' successfully.
2024-03-23 20:33:53.965 | pid 1144 | Running action 'disable'.
2024-03-23 20:33:54.183 | pid 1144 | DetectLoader failed: A:\EFI\HackBGRT\bootmgfw-original.efi not found
2024-03-23 20:33:54.183 | pid 1144 | Execute: bcdedit /enum firmware
2024-03-23 20:33:54.554 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 | Firmware Boot Manager
2024-03-23 20:33:54.554 | pid 1144 | ---------------------
2024-03-23 20:33:54.554 | pid 1144 | identifier {fwbootmgr}
2024-03-23 20:33:54.554 | pid 1144 | displayorder {8ecb1e79-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e78-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {fa6e64f8-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:54.554 | pid 1144 | {fa6e64f9-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:54.554 | pid 1144 | timeout 0
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 | Windows Boot Manager
2024-03-23 20:33:54.554 | pid 1144 | --------------------
2024-03-23 20:33:54.554 | pid 1144 | identifier {bootmgr}
2024-03-23 20:33:54.554 | pid 1144 | device boot
2024-03-23 20:33:54.554 | pid 1144 | description Windows Boot Manager
2024-03-23 20:33:54.554 | pid 1144 | locale es-ES
2024-03-23 20:33:54.554 | pid 1144 | inherit {globalsettings}
2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:54.554 | pid 1144 | default {current}
2024-03-23 20:33:54.554 | pid 1144 | resumeobject {1f8184a2-14de-11df-9734-f08c6d8c50b0}
2024-03-23 20:33:54.554 | pid 1144 | displayorder {8ecb1e79-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e78-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e76-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {8ecb1e77-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {current}
2024-03-23 20:33:54.554 | pid 1144 | {c1c7020a-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {c1c7020c-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | {c1c70208-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | toolsdisplayorder {memdiag}
2024-03-23 20:33:54.554 | pid 1144 | timeout 30
2024-03-23 20:33:54.554 | pid 1144 | displaybootmenu Yes
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:54.554 | pid 1144 | -------------------------------
2024-03-23 20:33:54.554 | pid 1144 | identifier {8ecb1e78-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | description Onboard NIC(IPV4)
2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:54.554 | pid 1144 | -------------------------------
2024-03-23 20:33:54.554 | pid 1144 | identifier {8ecb1e79-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.554 | pid 1144 | description Onboard NIC(IPV6)
2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:54.554 | pid 1144 | -------------------------------
2024-03-23 20:33:54.554 | pid 1144 | identifier {fa6e64f8-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:54.554 | pid 1144 | device partition=D:
2024-03-23 20:33:54.554 | pid 1144 | path \EFI\boot\bootx64.efi
2024-03-23 20:33:54.554 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 4
2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:54.554 | pid 1144 | -------------------------------
2024-03-23 20:33:54.554 | pid 1144 | identifier {fa6e64f9-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:54.554 | pid 1144 | device partition=A:
2024-03-23 20:33:54.554 | pid 1144 | path \EFI\Microsoft\Boot\bootmgfw.efi
2024-03-23 20:33:54.554 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 6
2024-03-23 20:33:54.554 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 |
2024-03-23 20:33:54.554 | pid 1144 | Execute: bcdedit /enum {8ecb1e79-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.815 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:54.815 | pid 1144 |
2024-03-23 20:33:54.815 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:54.815 | pid 1144 | -------------------------------
2024-03-23 20:33:54.815 | pid 1144 | identifier {8ecb1e79-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:54.815 | pid 1144 | description Onboard NIC(IPV6)
2024-03-23 20:33:54.815 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:54.815 | pid 1144 |
2024-03-23 20:33:54.815 | pid 1144 |
2024-03-23 20:33:54.815 | pid 1144 |
2024-03-23 20:33:54.815 | pid 1144 | Execute: bcdedit /enum {8ecb1e78-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:55.081 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:55.081 | pid 1144 |
2024-03-23 20:33:55.081 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:55.081 | pid 1144 | -------------------------------
2024-03-23 20:33:55.081 | pid 1144 | identifier {8ecb1e78-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:55.081 | pid 1144 | description Onboard NIC(IPV4)
2024-03-23 20:33:55.081 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:55.081 | pid 1144 |
2024-03-23 20:33:55.081 | pid 1144 |
2024-03-23 20:33:55.081 | pid 1144 |
2024-03-23 20:33:55.081 | pid 1144 | Execute: bcdedit /enum {fa6e64f8-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:55.346 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:55.346 | pid 1144 |
2024-03-23 20:33:55.346 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:55.346 | pid 1144 | -------------------------------
2024-03-23 20:33:55.346 | pid 1144 | identifier {fa6e64f8-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:55.346 | pid 1144 | device partition=D:
2024-03-23 20:33:55.346 | pid 1144 | path \EFI\boot\bootx64.efi
2024-03-23 20:33:55.346 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 4
2024-03-23 20:33:55.346 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:55.346 | pid 1144 |
2024-03-23 20:33:55.346 | pid 1144 |
2024-03-23 20:33:55.346 | pid 1144 |
2024-03-23 20:33:55.346 | pid 1144 | Execute: bcdedit /enum {fa6e64f9-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:55.618 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:55.618 | pid 1144 |
2024-03-23 20:33:55.618 | pid 1144 | Firmware Application (101fffff)
2024-03-23 20:33:55.618 | pid 1144 | -------------------------------
2024-03-23 20:33:55.618 | pid 1144 | identifier {fa6e64f9-e918-11ee-a402-806e6f6e6963}
2024-03-23 20:33:55.618 | pid 1144 | device partition=A:
2024-03-23 20:33:55.618 | pid 1144 | path \EFI\Microsoft\Boot\bootmgfw.efi
2024-03-23 20:33:55.618 | pid 1144 | description UEFI: PC401 NVMe SK hynix 1TB, Partition 6
2024-03-23 20:33:55.618 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:55.618 | pid 1144 |
2024-03-23 20:33:55.618 | pid 1144 |
2024-03-23 20:33:55.618 | pid 1144 |
2024-03-23 20:33:55.618 | pid 1144 | Execute: bcdedit /enum {1f8184a2-14de-11df-9734-f08c6d8c50b0}
2024-03-23 20:33:55.884 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:55.884 | pid 1144 | There are no matching objects or the store is empty.
2024-03-23 20:33:55.884 | pid 1144 |
2024-03-23 20:33:55.884 | pid 1144 |
2024-03-23 20:33:55.884 | pid 1144 |
2024-03-23 20:33:55.884 | pid 1144 | Execute: bcdedit /enum {8ecb1e76-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.150 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:56.150 | pid 1144 | There are no matching objects or the store is empty.
2024-03-23 20:33:56.150 | pid 1144 |
2024-03-23 20:33:56.150 | pid 1144 |
2024-03-23 20:33:56.150 | pid 1144 |
2024-03-23 20:33:56.150 | pid 1144 | Execute: bcdedit /enum {8ecb1e77-e971-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.416 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:56.416 | pid 1144 | There are no matching objects or the store is empty.
2024-03-23 20:33:56.416 | pid 1144 |
2024-03-23 20:33:56.416 | pid 1144 |
2024-03-23 20:33:56.416 | pid 1144 |
2024-03-23 20:33:56.416 | pid 1144 | Execute: bcdedit /enum {c1c7020a-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.697 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:56.697 | pid 1144 |
2024-03-23 20:33:56.697 | pid 1144 | Windows Boot Loader
2024-03-23 20:33:56.697 | pid 1144 | -------------------
2024-03-23 20:33:56.697 | pid 1144 | identifier {c1c7020a-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.697 | pid 1144 | device ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.697 | pid 1144 | path \Windows\System32\Boot\winload.efi
2024-03-23 20:33:56.697 | pid 1144 | description Anhdv 24 Windows 11 PE
2024-03-23 20:33:56.697 | pid 1144 | locale en-US
2024-03-23 20:33:56.697 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:56.697 | pid 1144 | osdevice ramdisk=[D:]\WIM\w11pe64.wim,{c1c70209-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.697 | pid 1144 | systemroot \Windows
2024-03-23 20:33:56.697 | pid 1144 | nx OptIn
2024-03-23 20:33:56.697 | pid 1144 | detecthal Yes
2024-03-23 20:33:56.697 | pid 1144 | winpe Yes
2024-03-23 20:33:56.697 | pid 1144 |
2024-03-23 20:33:56.697 | pid 1144 |
2024-03-23 20:33:56.697 | pid 1144 |
2024-03-23 20:33:56.697 | pid 1144 | Execute: bcdedit /enum {c1c7020c-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.962 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:56.962 | pid 1144 |
2024-03-23 20:33:56.962 | pid 1144 | Windows Boot Loader
2024-03-23 20:33:56.962 | pid 1144 | -------------------
2024-03-23 20:33:56.962 | pid 1144 | identifier {c1c7020c-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.962 | pid 1144 | device ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.962 | pid 1144 | path \Windows\System32\Boot\winload.efi
2024-03-23 20:33:56.962 | pid 1144 | description Anhdv 21 Windows 10 PE
2024-03-23 20:33:56.962 | pid 1144 | locale en-US
2024-03-23 20:33:56.962 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:56.962 | pid 1144 | osdevice ramdisk=[D:]\WIM\w10pe64_21.wim,{c1c7020b-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:56.962 | pid 1144 | systemroot \Windows
2024-03-23 20:33:56.962 | pid 1144 | nx OptIn
2024-03-23 20:33:56.962 | pid 1144 | detecthal Yes
2024-03-23 20:33:56.962 | pid 1144 | winpe Yes
2024-03-23 20:33:56.962 | pid 1144 |
2024-03-23 20:33:56.962 | pid 1144 |
2024-03-23 20:33:56.962 | pid 1144 |
2024-03-23 20:33:56.962 | pid 1144 | Execute: bcdedit /enum {c1c70208-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:57.256 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:57.256 | pid 1144 |
2024-03-23 20:33:57.256 | pid 1144 | Windows Boot Loader
2024-03-23 20:33:57.256 | pid 1144 | -------------------
2024-03-23 20:33:57.256 | pid 1144 | identifier {c1c70208-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:57.256 | pid 1144 | device ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:57.256 | pid 1144 | path \Windows\System32\Boot\winload.efi
2024-03-23 20:33:57.256 | pid 1144 | description WinRE
2024-03-23 20:33:57.256 | pid 1144 | locale es-MX
2024-03-23 20:33:57.256 | pid 1144 | isolatedcontext Yes
2024-03-23 20:33:57.256 | pid 1144 | osdevice ramdisk=[E:]\Recovery\WindowsRE\winre.wim,{c1c70207-e972-11ee-9338-2079188d02a6}
2024-03-23 20:33:57.256 | pid 1144 | systemroot \Windows
2024-03-23 20:33:57.256 | pid 1144 | nx OptIn
2024-03-23 20:33:57.256 | pid 1144 | detecthal Yes
2024-03-23 20:33:57.256 | pid 1144 | winpe Yes
2024-03-23 20:33:57.256 | pid 1144 |
2024-03-23 20:33:57.256 | pid 1144 |
2024-03-23 20:33:57.256 | pid 1144 |
2024-03-23 20:33:57.257 | pid 1144 | Read EFI variable: BootOrder Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' ' Bytes='17 00 16 00 18 00 19 00'
2024-03-23 20:33:57.268 | pid 1144 | Disabled NVRAM entry for HackBGRT.
2024-03-23 20:33:57.269 | pid 1144 | HackBGRT has been disabled.
2024-03-23 20:33:57.270 | pid 1144 | Completed action 'disable' successfully.
2024-03-23 20:33:57.270 | pid 1144 | Running action 'enable-entry'.
2024-03-23 20:33:57.271 | pid 1144 | Execute: manage-bde -status
2024-03-23 20:33:57.574 | pid 1144 | Exit code: 0, output:
2024-03-23 20:33:57.574 | pid 1144 | BitLocker Drive Encryption: Configuration Tool version 10.0.19041
2024-03-23 20:33:57.574 | pid 1144 | Copyright (C) 2013 Microsoft Corporation. All rights reserved.
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 | Disk volumes that can be protected with
2024-03-23 20:33:57.574 | pid 1144 | BitLocker Drive Encryption:
2024-03-23 20:33:57.574 | pid 1144 | Volume C: []
2024-03-23 20:33:57.574 | pid 1144 | [OS Volume]
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 | Size: 948.20 GB
2024-03-23 20:33:57.574 | pid 1144 | BitLocker Version: 2.0
2024-03-23 20:33:57.574 | pid 1144 | Conversion Status: Fully Encrypted
2024-03-23 20:33:57.574 | pid 1144 | Percentage Encrypted: 100.0%
2024-03-23 20:33:57.574 | pid 1144 | Encryption Method: XTS-AES 128
2024-03-23 20:33:57.574 | pid 1144 | Protection Status: Protection On
2024-03-23 20:33:57.574 | pid 1144 | Lock Status: Unlocked
2024-03-23 20:33:57.574 | pid 1144 | Identification Field: Unknown
2024-03-23 20:33:57.574 | pid 1144 | Key Protectors:
2024-03-23 20:33:57.574 | pid 1144 | Numerical Password
2024-03-23 20:33:57.574 | pid 1144 | TPM And PIN
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 | Volume D: [Anhdv]
2024-03-23 20:33:57.574 | pid 1144 | [Data Volume]
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 | Size: 4.00 GB
2024-03-23 20:33:57.574 | pid 1144 | BitLocker Version: None
2024-03-23 20:33:57.574 | pid 1144 | Conversion Status: Fully Decrypted
2024-03-23 20:33:57.574 | pid 1144 | Percentage Encrypted: 0.0%
2024-03-23 20:33:57.574 | pid 1144 | Encryption Method: None
2024-03-23 20:33:57.574 | pid 1144 | Protection Status: Protection Off
2024-03-23 20:33:57.574 | pid 1144 | Lock Status: Unlocked
2024-03-23 20:33:57.574 | pid 1144 | Identification Field: None
2024-03-23 20:33:57.574 | pid 1144 | Automatic Unlock: Disabled
2024-03-23 20:33:57.574 | pid 1144 | Key Protectors: None Found
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 |
2024-03-23 20:33:57.574 | pid 1144 | BitLocker is enabled. Make sure you have your recovery key!
2024-03-23 20:33:57.574 | pid 1144 | Choose action (press a key):
2024-03-23 20:33:57.574 | pid 1144 | I = Install anyway; THIS MAY BE DANGEROUS!
2024-03-23 20:33:57.574 | pid 1144 | C = Cancel
2024-03-23 20:33:59.556 | pid 1144 | User input: I
2024-03-23 20:33:59.556 | pid 1144 |
2024-03-23 20:33:59.556 | pid 1144 | Continuing. THIS MAY BE DANGEROUS!
2024-03-23 20:33:59.556 | pid 1144 | Read EFI variable: BootOrder Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=7 Text=' ' Bytes='17 00 16 00 18 00 19 00'
2024-03-23 20:33:59.556 | pid 1144 | Read EFI variable: BootCurrent Guid={8be4df61-93ca-11d2-aa0d-00e098032b8c} Attributes=6 Text=' ' Bytes='19 00'
2024-03-23 20:33:59.696 | pid 1144 |
2024-03-23 20:33:59.696 | pid 1144 | Unexpected error: MakeBootEntry: Windows Boot Manager not found.
2024-03-23 20:33:59.696 | pid 1144 | System.Exception: MakeBootEntry: Windows Boot Manager not found.
2024-03-23 20:33:59.696 | pid 1144 | at Efi.MakeAndEnableBootEntry(String label, String fileName, Boolean alwaysCopyFromMS, Boolean dryRun)
2024-03-23 20:33:59.696 | pid 1144 | at Setup.EnableEntry()
2024-03-23 20:33:59.696 | pid 1144 | at Setup.<>c__DisplayClass45_0.b__2()
2024-03-23 20:33:59.696 | pid 1144 | at Setup.<>c__DisplayClass45_0.b__1(Action enable, Action revert)
2024-03-23 20:33:59.696 | pid 1144 | at Setup.RunPrivilegedActions(IEnumerable1 actions) 2024-03-23 20:33:59.696 | pid 1144 | at Setup.Run(String[] args) 2024-03-23 20:33:59.712 | pid 1144 | If this is the most current release, please report this bug. 2024-03-23 20:33:59.712 | pid 1144 | If you need to report a bug, 2024-03-23 20:33:59.712 | pid 1144 | - run this setup again with menu option L (show-boot-log) 2024-03-23 20:33:59.712 | pid 1144 | - then include the setup.log file with your report. 2024-03-23 20:33:59.712 | pid 1144 | Press any key to quit. 2024-03-23 20:34:01.660 | pid 6512 | 2024-03-23 20:34:01.660 | pid 6512 | Error: Privileged action (install disable enable-entry) failed! 2024-03-23 20:34:01.660 | pid 6512 | Setup+SetupException: Privileged action (install disable enable-entry) failed! 2024-03-23 20:34:01.660 | pid 6512 | at Setup.RunPrivilegedActions(IEnumerable1 actions)
2024-03-23 20:34:01.660 | pid 6512 | at Setup.ShowMenu()
2024-03-23 20:34:01.660 | pid 6512 | at Setup.Run(String[] args)
2024-03-23 20:34:01.660 | pid 6512 | If you need to report a bug,
2024-03-23 20:34:01.660 | pid 6512 | - run this setup again with menu option L (show-boot-log)
2024-03-23 20:34:01.660 | pid 6512 | - then include the setup.log file with your report.
2024-03-23 20:34:01.660 | pid 6512 | Press any key to quit.

@Metabolix
Copy link
Owner

Metabolix commented Mar 24, 2024

The real BCD entries are actually not relevant. Unfortunately and somewhat misleadingly, BCDEdit is also used for configuring UEFI firmware entries and it shows them along with the BCD entries. The entry which boots Windows is the one pointing to bootmgfw.efi.

In your case, the entry looks more like a firmware generated fallback entry, at least it's not in the form created by Microsoft tools, and HackBGRT fails to detect it. Maybe I could change the logic for this, but in any case, HackBGRT doesn't create entries from nothing but relies on copying and modifying the Windows entry.

When you messed up your BCD, did you run the Startup Repair to fix it? I assume it would create the original UEFI entry.

Your log only shows the second install option (J). Did you try the first install option (I)?

It's better to attach the log and not copy-paste, it's very difficult to read this thread with such a long log attached.

@Metabolix
Copy link
Owner

I noticed now that Boot0019, which contains that bootmgfw.efi path, has some extra DevicePathNode components after the end-of-path marker. I will soon commit a patch to detect this somewhat unusual boot entry.

Metabolix added a commit that referenced this issue Apr 11, 2024
Apparently some firmware may add extra data to the device path,
so exit the loop on the first end-of-path record.
Fixes GH issue #181.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants