Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
 iVentoy Service doesn't starting
#3
(07-10-2023, 12:39 AM)longpanda Wrote: Please upload the log.txt file.
Here it is;:
  • The message is too long. Please enter a message shorter than 65535 characters (currently 260611).
Post a New Reply

Code:
2023/07/14 00:35:55.429 [PXE]  [8] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.429 [PXE]  [8] search winpeshl.exe 000001E210077990
2023/07/14 00:35:55.429 [PXE]  [8] find replace file at 000001E210077990
2023/07/14 00:35:55.429 [PXE]  [8] search hash <6f61a75215e3c22de19bb350c92e3863494acfaa>
2023/07/14 00:35:55.429 [PXE]  [8] find replace lookup entry_id:2634 raw_size:32256
2023/07/14 00:35:55.429 [PXE]  [8] 13176 32256 chunk_num=1
2023/07/14 00:35:55.429 [PXE]  [11] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.429 [PXE]  [11] @@ locate wim file </sources/boot.wim> ...
2023/07/14 00:35:55.429 [PXE]  [12] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.429 [PXE]  [12] @@ locate wim file </ktv/10ktv64.wim> ...
2023/07/14 00:35:55.429 [PXE]  [8] last chunk_size:13176 decompresslen:32256 tot:32256
2023/07/14 00:35:55.429 [PXE]  [8] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.429 [PXE]  [11] @@@ overlen=8 overoff=764080 fe_entry_size_offset=763960 start_block=257 file_offset=20488192
2023/07/14 00:35:55.429 [PXE]  [12] @@@ overlen=8 overoff=735408 fe_entry_size_offset=735288 start_block=257 file_offset=1952462848
2023/07/14 00:35:55.430 [PXE]  [12] 288730 1309216 chunk_num=40
2023/07/14 00:35:55.430 [PXE]  [4] 973028 5126568 chunk_num=157
2023/07/14 00:35:55.430 [PXE]  [10] 1007492 5132896 chunk_num=157
2023/07/14 00:35:55.430 [PXE]  [11] 1085808 5685408 chunk_num=174
2023/07/14 00:35:55.433 [PXE]  [12] last chunk_size:6098 decompresslen:31264 tot:1309216
2023/07/14 00:35:55.433 [PXE]  [12] read lookup offset:418122133 size:258650
2023/07/14 00:35:55.433 [PXE]  [12] search pecmd.exe 000001E212B2D668
2023/07/14 00:35:55.433 [PXE]  [12] search reg SYSTEM 000001E212B54250
2023/07/14 00:35:55.433 [PXE]  [12] find system lookup entry_id:4963 raw_size:8126464
2023/07/14 00:35:55.434 [PXE]  [12] 1148308 8126464 chunk_num=248
2023/07/14 00:35:55.438 [PXE]  [9] last chunk_size:3894 decompresslen:13616 tot:5322032
2023/07/14 00:35:55.438 [PXE]  [9] read lookup offset:309024079 size:669150
2023/07/14 00:35:55.439 [PXE]  [9] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.439 [PXE]  [9] search winpeshl.exe 000001E210F8FE98
2023/07/14 00:35:55.439 [PXE]  [9] find replace file at 000001E210F8FE98
2023/07/14 00:35:55.439 [PXE]  [9] search hash <537aeaab7b0818885f8c1b54fd73a12050a22836>
2023/07/14 00:35:55.439 [PXE]  [9] find replace lookup entry_id:1954 raw_size:541184
2023/07/14 00:35:55.439 [PXE]  [9] 116796 541184 chunk_num=17
2023/07/14 00:35:55.439 [PXE]  [4] last chunk_size:3274 decompresslen:14760 tot:5126568
2023/07/14 00:35:55.440 [PXE]  [4] read lookup offset:416751063 size:610900
2023/07/14 00:35:55.440 [PXE]  [4] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.440 [PXE]  [4] search winpeshl.exe 000001E2117FB368
2023/07/14 00:35:55.440 [PXE]  [4] find replace file at 000001E2117FB368
2023/07/14 00:35:55.440 [PXE]  [4] search hash <b398925bedfcd765a7bff51f10c25d844f462baa>
2023/07/14 00:35:55.440 [PXE]  [4] find replace lookup entry_id:7707 raw_size:33280
2023/07/14 00:35:55.440 [PXE]  [4] 13272 33280 chunk_num=2
2023/07/14 00:35:55.440 [PXE]  [4] last chunk_size:144 decompresslen:512 tot:33280
2023/07/14 00:35:55.440 [PXE]  [10] last chunk_size:5394 decompresslen:21088 tot:5132896
2023/07/14 00:35:55.440 [PXE]  [10] read lookup offset:335161036 size:583650
2023/07/14 00:35:55.440 [PXE]  [4] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.441 [PXE]  [9] last chunk_size:1748 decompresslen:16896 tot:541184
2023/07/14 00:35:55.441 [PXE]  [9] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.441 [PXE]  [11] last chunk_size:4474 decompresslen:16544 tot:5685408
2023/07/14 00:35:55.441 [PXE]  [11] read lookup offset:418931091 size:647500
2023/07/14 00:35:55.441 [PXE]  [4] jump_exe_len:188416 bin_raw_len:1153776 bin_align_len:1155072
2023/07/14 00:35:55.441 [PXE]  [4] windows locate wim finish
2023/07/14 00:35:55.441 [PXE]  [4] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.441 [PXE]  [4] UDF fill override data ...
2023/07/14 00:35:55.441 [PXE]  [4] PdSizeOffset=71872 tagOffset=71680
2023/07/14 00:35:55.441 [PXE]  [9] jump_exe_len:188416 bin_raw_len:1661680 bin_align_len:1662976
2023/07/14 00:35:55.441 [PXE]  [9] windows locate wim finish
2023/07/14 00:35:55.441 [PXE]  [9] Windows virt data new <Windows> ...
2023/07/14 00:35:55.441 [PXE]  [4] UDF tag valid OK, should match it.
2023/07/14 00:35:55.441 [PXE]  [4] UDF tag refresh OK.
2023/07/14 00:35:55.441 [PXE]  [4] ## virt wim file </sources/boot.wim> <417365895> <New:424261632> ...
2023/07/14 00:35:55.441 [PXE]  [4] file_entry and extend data in the same block.
2023/07/14 00:35:55.441 [PXE]  [9] bootfix.bin data: 80 00 cd 13
2023/07/14 00:35:55.441 [PXE]  [9] Auto suppress BIOS cdrom prompt
2023/07/14 00:35:55.441 [PXE]  [10] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.441 [PXE]  [10] search winpeshl.exe 000001E211DCF418
2023/07/14 00:35:55.441 [PXE]  [10] find replace file at 000001E211DCF418
2023/07/14 00:35:55.441 [PXE]  [10] search hash <20ff96887a316fcb59c64ef9b477cfe256761c02>
2023/07/14 00:35:55.441 [PXE]  [11] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.441 [PXE]  [10] find replace lookup entry_id:2393 raw_size:30208
2023/07/14 00:35:55.441 [PXE]  [11] search winpeshl.exe 000001E2125051F0
2023/07/14 00:35:55.441 [PXE]  [11] find replace file at 000001E2125051F0
2023/07/14 00:35:55.441 [PXE]  [11] search hash <6f61a75215e3c22de19bb350c92e3863494acfaa>
2023/07/14 00:35:55.441 [PXE]  [4] fix tag override 168[698384 - 698552] 698424 698368 56
2023/07/14 00:35:55.441 [PXE]  [11] find replace lookup entry_id:2542 raw_size:32256
2023/07/14 00:35:55.441 [PXE]  [9] Auto suppress UEFI cdrom prompt
2023/07/14 00:35:55.441 [PXE]  [9] UDF fill override data ...
2023/07/14 00:35:55.441 [PXE]  [9] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.441 [PXE]  [10] 12730 30208 chunk_num=1
2023/07/14 00:35:55.441 [PXE]  [4] find target file, name_len:24, offset: 725864, upadte hash
2023/07/14 00:35:55.442 [PXE]  [11] 13208 32256 chunk_num=1
2023/07/14 00:35:55.442 [PXE]  [9] UDF tag valid OK, should match it.
2023/07/14 00:35:55.442 [PXE]  [9] UDF tag refresh OK.
2023/07/14 00:35:55.442 [PXE]  [9] ## virt wim file </sources/boot.wim> <309697521> <New:317353984> ...
2023/07/14 00:35:55.442 [PXE]  [9] file_entry and extend data in the same block.
2023/07/14 00:35:55.442 [PXE]  [5] last chunk_size:3806 decompresslen:17320 tot:5129128
2023/07/14 00:35:55.442 [PXE]  [5] read lookup offset:416517986 size:611600
2023/07/14 00:35:55.442 [PXE]  [10] last chunk_size:12730 decompresslen:30208 tot:30208
2023/07/14 00:35:55.442 [PXE]  [10] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.442 [PXE]  [11] last chunk_size:13208 decompresslen:32256 tot:32256
2023/07/14 00:35:55.442 [PXE]  [11] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.442 [PXE]  [8] jump_exe_len:188416 bin_raw_len:1152752 bin_align_len:1153024
2023/07/14 00:35:55.442 [PXE]  [9] fix tag override 168[765968 - 766136] 766008 765952 56
2023/07/14 00:35:55.442 [PXE]  [8] windows locate wim finish
2023/07/14 00:35:55.442 [PXE]  [8] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.442 [PXE]  [4] find target file, name_len:24, offset: 3350664, upadte hash
2023/07/14 00:35:55.442 [PXE]  [8] UDF fill override data ...
2023/07/14 00:35:55.442 [PXE]  [8] PdSizeOffset=530624 tagOffset=530432
2023/07/14 00:35:55.442 [PXE]  [8] UDF tag valid OK, should match it.
2023/07/14 00:35:55.442 [PXE]  [8] UDF tag refresh OK.
2023/07/14 00:35:55.442 [PXE]  [8] ## virt wim file </sources/boot.wim> <260639758> <New:266465280> ...
2023/07/14 00:35:55.442 [PXE]  [8] file_entry and extend data in the same block.
2023/07/14 00:35:55.442 [PXE]  [10] jump_exe_len:188416 bin_raw_len:1150704 bin_align_len:1150976
2023/07/14 00:35:55.442 [PXE]  [10] windows locate wim finish
2023/07/14 00:35:55.442 [PXE]  [10] Windows virt data new <Windows> ...
2023/07/14 00:35:55.442 [PXE]  [11] jump_exe_len:188416 bin_raw_len:1152752 bin_align_len:1153024
2023/07/14 00:35:55.442 [PXE]  [11] windows locate wim finish
2023/07/14 00:35:55.442 [PXE]  [11] Windows virt data new <Windows> ...
2023/07/14 00:35:55.442 [PXE]  [8] fix tag override 224[2162704 - 2162928] 2162744 2162688 56
2023/07/14 00:35:55.442 [PXE]  [9] find target file, name_len:24, offset: 863896, upadte hash
2023/07/14 00:35:55.442 [PXE]  [10] bootfix.bin data: 80 00 cd 13
2023/07/14 00:35:55.442 [PXE]  [10] Auto suppress BIOS cdrom prompt
2023/07/14 00:35:55.442 [PXE]  [4] update replace lookup entry_id:7707
2023/07/14 00:35:55.442 [PXE]  [4] find meta lookup entry_id:1, update resource head and hash(5126568)
2023/07/14 00:35:55.442 [PXE]  [11] bootfix.bin data: 80 00 cd 13
2023/07/14 00:35:55.442 [PXE]  [11] Auto suppress BIOS cdrom prompt
2023/07/14 00:35:55.442 [PXE]  [4] Virt data ISO file size: 4617338880 5041600512
2023/07/14 00:35:55.442 [PXE]  [4] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.442 [PXE]  [4]  <0> [ 71680 - 72192 512 ]
2023/07/14 00:35:55.442 [PXE]  [4]  <1> [ 698368 - 698880 512 ]
2023/07/14 00:35:55.442 [PXE]  [4] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.442 [PXE]  [4] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.442 [PXE]  [4]  <iso/Windows.10.Pro.19044.2130.iso> WIM:1/1
2023/07/14 00:35:55.442 [PXE]  [4]  <01> [4617338880 - 5034704896 417366016 ] Remap
2023/07/14 00:35:55.442 [PXE]  [10] Auto suppress UEFI cdrom prompt
2023/07/14 00:35:55.442 [PXE]  [4]  <02> [4617338880 - 4617339088 208      ] Memory
2023/07/14 00:35:55.442 [PXE]  [10] UDF fill override data ...
2023/07/14 00:35:55.442 [PXE]  [10] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.442 [PXE]  [4]  <03> [5034704896 - 5035859968 1155072  ] Memory
2023/07/14 00:35:55.442 [PXE]  [4]  <04> [5034893412 - 5034894436 1024      ] iVentoy Param
2023/07/14 00:35:55.442 [PXE]  [4]  <05> [5035859968 - 5040988160 5128192  ] Memory
2023/07/14 00:35:55.442 [PXE]  [4]  <06> [5036585832 - 5036585852 20        ] WIM BIN CHK
2023/07/14 00:35:55.442 [PXE]  [4]  <07> [5039210632 - 5039210652 20        ] WIM BIN CHK
2023/07/14 00:35:55.442 [PXE]  [4]  <08> [5040988160 - 5041600512 612352    ] Memory
2023/07/14 00:35:55.442 [PXE]  [4]  <09> [5041373540 - 5041373560 20        ] WIM BIN CHK
2023/07/14 00:35:55.442 [PXE]  [11] Auto suppress UEFI cdrom prompt
2023/07/14 00:35:55.442 [PXE]  [4]  <10> [5040988240 - 5040988260 20        ] WIM META CHK
2023/07/14 00:35:55.442 [PXE]  [11] UDF fill override data ...
2023/07/14 00:35:55.442 [PXE]  [9] find target file, name_len:24, offset: 3056944, upadte hash
2023/07/14 00:35:55.442 [PXE]  [11] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.442 [PXE]  [4] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.442 [PXE]  [8] find target file, name_len:24, offset: 592272, upadte hash
2023/07/14 00:35:55.442 [PXE]  [4] Phase2 parse image <iso/Windows.10.Pro.19044.2130.iso> finished success
2023/07/14 00:35:55.442 [PXE]  [13] Phase2 parse image <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.03.21_English.iso> <UDF> starting...
2023/07/14 00:35:55.442 [PXE]  [13] locate wim data (wims:5) ...
2023/07/14 00:35:55.442 [PXE]  [10] UDF tag valid OK, should match it.
2023/07/14 00:35:55.442 [PXE]  [10] UDF tag refresh OK.
2023/07/14 00:35:55.442 [PXE]  [10] ## virt wim file </sources/boot.wim> <335749026> <New:342618112> ...
2023/07/14 00:35:55.442 [PXE]  [10] file_entry and extend data in the same block.
2023/07/14 00:35:55.442 [PXE]  [11] UDF tag valid OK, should match it.
2023/07/14 00:35:55.443 [PXE]  [11] UDF tag refresh OK.
2023/07/14 00:35:55.443 [PXE]  [11] ## virt wim file </sources/boot.wim> <419582993> <New:427073536> ...
2023/07/14 00:35:55.443 [PXE]  [11] file_entry and extend data in the same block.
2023/07/14 00:35:55.443 [PXE]  [8] find target file, name_len:24, offset: 2391136, upadte hash
2023/07/14 00:35:55.443 [PXE]  [10] fix tag override 168[802832 - 803000] 802872 802816 56
2023/07/14 00:35:55.443 [PXE]  [11] fix tag override 168[763920 - 764088] 763960 763904 56
2023/07/14 00:35:55.443 [PXE]  [9] update replace lookup entry_id:1954
2023/07/14 00:35:55.443 [PXE]  [9] find meta lookup entry_id:1, update resource head and hash(5322032)
2023/07/14 00:35:55.443 [PXE]  [9] Virt data ISO file size: 5973016576 6290370560
2023/07/14 00:35:55.443 [PXE]  [9] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [9]  <0> [ 10219544 - 10219548 4 ]
2023/07/14 00:35:55.443 [PXE]  [9]  <1> [ 3211264 - 4685824 1474560 ]
2023/07/14 00:35:55.443 [PXE]  [9]  <2> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.443 [PXE]  [9]  <3> [ 765952 - 766464 512 ]
2023/07/14 00:35:55.443 [PXE]  [9] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [9] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [9]  <iso/windows_server_2012_r2_with_update_9600.20969_aio_16in1_x64.iso> WIM:1/1
2023/07/14 00:35:55.443 [PXE]  [9]  <01> [5973016576 - 6282715136 309698560 ] Remap
2023/07/14 00:35:55.443 [PXE]  [9]  <02> [5973016576 - 5973016784 208      ] Memory
2023/07/14 00:35:55.443 [PXE]  [9]  <03> [6282715136 - 6284378112 1662976  ] Memory
2023/07/14 00:35:55.443 [PXE]  [13] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.443 [PXE]  [9]  <04> [6282903652 - 6282904676 1024      ] iVentoy Param
2023/07/14 00:35:55.443 [PXE]  [13] @@ locate wim file </SSTR/strelec11x64Eng.wim> ...
2023/07/14 00:35:55.443 [PXE]  [9]  <05> [6284378112 - 6289700864 5322752  ] Memory
2023/07/14 00:35:55.443 [PXE]  [9]  <06> [6285242008 - 6285242028 20        ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE]  [9]  <07> [6287435056 - 6287435076 20        ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE]  [9]  <08> [6289700864 - 6290370560 669696    ] Memory
2023/07/14 00:35:55.443 [PXE]  [10] find target file, name_len:24, offset: 717848, upadte hash
2023/07/14 00:35:55.443 [PXE]  [9]  <09> [6289798594 - 6289798614 20        ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE]  [9]  <10> [6289700944 - 6289700964 20        ] WIM META CHK
2023/07/14 00:35:55.443 [PXE]  [9] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [9] Phase2 parse image <iso/windows_server_2012_r2_with_update_9600.20969_aio_16in1_x64.iso> finished success
2023/07/14 00:35:55.443 [PXE]  [14] Phase2 parse image <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.06.25_English.iso> <UDF> starting...
2023/07/14 00:35:55.443 [PXE]  [14] locate wim data (wims:5) ...
2023/07/14 00:35:55.443 [PXE]  [11] find target file, name_len:24, offset: 905712, upadte hash
2023/07/14 00:35:55.443 [PXE]  [13] @@@ overlen=8 overoff=4012264 fe_entry_size_offset=4012088 start_block=304 file_offset=789868544
2023/07/14 00:35:55.443 [PXE]  [10] find target file, name_len:24, offset: 2944920, upadte hash
2023/07/14 00:35:55.443 [PXE]  [8] update replace lookup entry_id:2634
2023/07/14 00:35:55.443 [PXE]  [8] find meta lookup entry_id:0, update resource head and hash(4239080)
2023/07/14 00:35:55.443 [PXE]  [8] Virt data ISO file size: 298205184 564670464
2023/07/14 00:35:55.443 [PXE]  [11] find target file, name_len:24, offset: 3346432, upadte hash
2023/07/14 00:35:55.443 [PXE]  [8] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [8]  <0> [ 530432 - 530944 512 ]
2023/07/14 00:35:55.443 [PXE]  [8]  <1> [ 2162688 - 2163200 512 ]
2023/07/14 00:35:55.443 [PXE]  [13] 281980 1059424 chunk_num=33
2023/07/14 00:35:55.443 [PXE]  [8] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [8] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [8]  <iso/Windows_Login_Unlocker.iso> WIM:1/1
2023/07/14 00:35:55.443 [PXE]  [8]  <01> [298205184 - 558845952 260640768 ] Remap
2023/07/14 00:35:55.443 [PXE]  [8]  <02> [298205184 - 298205392 208      ] Memory
2023/07/14 00:35:55.443 [PXE]  [8]  <03> [558845952 - 559998976 1153024  ] Memory
2023/07/14 00:35:55.443 [PXE]  [8]  <04> [559034468 - 559035492 1024      ] iVentoy Param
2023/07/14 00:35:55.443 [PXE]  [8]  <05> [559998976 - 564238336 4239360  ] Memory
2023/07/14 00:35:55.443 [PXE]  [8]  <06> [560591248 - 560591268 20        ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE]  [8]  <07> [562390112 - 562390132 20        ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE]  [8]  <08> [564238336 - 564670464 432128    ] Memory
2023/07/14 00:35:55.443 [PXE]  [8]  <09> [564370066 - 564370086 20        ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE]  [8]  <10> [564238366 - 564238386 20        ] WIM META CHK
2023/07/14 00:35:55.443 [PXE]  [8] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE]  [8] Phase2 parse image <iso/Windows_Login_Unlocker.iso> finished success
2023/07/14 00:35:55.443 [PXE]  [15] Phase2 parse image <iso/Xemom-Windows_11_PE_x64_En.iso> <UDF> starting...
2023/07/14 00:35:55.443 [PXE]  [15] locate wim data (wims:1) ...
2023/07/14 00:35:55.444 [PXE]  [10] update replace lookup entry_id:2393
2023/07/14 00:35:55.444 [PXE]  [10] find meta lookup entry_id:1, update resource head and hash(5132896)
2023/07/14 00:35:55.444 [PXE]  [10] Virt data ISO file size: 4724162560 5066780672
2023/07/14 00:35:55.444 [PXE]  [10] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [10]  <0> [ 9766936 - 9766940 4 ]
2023/07/14 00:35:55.444 [PXE]  [10]  <1> [ 3465216 - 4939776 1474560 ]
2023/07/14 00:35:55.444 [PXE]  [10]  <2> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.444 [PXE]  [10]  <3> [ 802816 - 803328 512 ]
2023/07/14 00:35:55.444 [PXE]  [10] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [10] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [10]  <iso/windows_server_2016_with_update_14393.5921_aio_16in1_x64.iso> WIM:1/1
2023/07/14 00:35:55.444 [PXE]  [10]  <01> [4724162560 - 5059911680 335749120 ] Remap
2023/07/14 00:35:55.444 [PXE]  [10]  <02> [4724162560 - 4724162768 208      ] Memory
2023/07/14 00:35:55.444 [PXE]  [11] update replace lookup entry_id:2542
2023/07/14 00:35:55.444 [PXE]  [10]  <03> [5059911680 - 5061062656 1150976  ] Memory
2023/07/14 00:35:55.444 [PXE]  [11] find meta lookup entry_id:1, update resource head and hash(5685408)
2023/07/14 00:35:55.444 [PXE]  [10]  <04> [5060100196 - 5060101220 1024      ] iVentoy Param
2023/07/14 00:35:55.444 [PXE]  [10]  <05> [5061062656 - 5066196992 5134336  ] Memory
2023/07/14 00:35:55.444 [PXE]  [11] Virt data ISO file size: 4810375168 5237448704
2023/07/14 00:35:55.444 [PXE]  [10]  <06> [5061780504 - 5061780524 20        ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE]  [11] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [10]  <07> [5064007576 - 5064007596 20        ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE]  [11]  <0> [ 9840664 - 9840668 4 ]
2023/07/14 00:35:55.444 [PXE]  [10]  <08> [5066196992 - 5066780672 583680    ] Memory
2023/07/14 00:35:55.444 [PXE]  [11]  <1> [ 3229696 - 4704256 1474560 ]
2023/07/14 00:35:55.444 [PXE]  [10]  <09> [5066316672 - 5066316692 20        ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE]  [11]  <2> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.444 [PXE]  [11]  <3> [ 763904 - 764416 512 ]
2023/07/14 00:35:55.444 [PXE]  [10]  <10> [5066197072 - 5066197092 20        ] WIM META CHK
2023/07/14 00:35:55.444 [PXE]  [11] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [10] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [11] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [10] Phase2 parse image <iso/windows_server_2016_with_update_14393.5921_aio_16in1_x64.iso> finished success
2023/07/14 00:35:55.444 [PXE]  [11]  <iso/windows_server_2019_with_update_17763.4377_aio_12in1_x64.iso> WIM:1/1
2023/07/14 00:35:55.444 [PXE]  [11]  <01> [4810375168 - 5229959168 419584000 ] Remap
2023/07/14 00:35:55.444 [PXE]  [11]  <02> [4810375168 - 4810375376 208      ] Memory
2023/07/14 00:35:55.444 [PXE]  [11]  <03> [5229959168 - 5231112192 1153024  ] Memory
2023/07/14 00:35:55.444 [PXE]  [11]  <04> [5230147684 - 5230148708 1024      ] iVentoy Param
2023/07/14 00:35:55.444 [PXE]  [11]  <05> [5231112192 - 5236799488 5687296  ] Memory
2023/07/14 00:35:55.444 [PXE]  [11]  <06> [5232017904 - 5232017924 20        ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE]  [5] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.444 [PXE]  [11]  <07> [5234458624 - 5234458644 20        ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE]  [11]  <08> [5236799488 - 5237448704 649216    ] Memory
2023/07/14 00:35:55.444 [PXE]  [11]  <09> [5236926618 - 5236926638 20        ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE]  [11]  <10> [5236799568 - 5236799588 20        ] WIM META CHK
2023/07/14 00:35:55.444 [PXE]  [5] search winpeshl.exe 000001E21057CD68
2023/07/14 00:35:55.444 [PXE]  [11] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE]  [5] find replace file at 000001E21057CD68
2023/07/14 00:35:55.444 [PXE]  [11] Phase2 parse image <iso/windows_server_2019_with_update_17763.4377_aio_12in1_x64.iso> finished success
2023/07/14 00:35:55.444 [PXE]  [5] search hash <b398925bedfcd765a7bff51f10c25d844f462baa>
2023/07/14 00:35:55.444 [PXE]  [5] find replace lookup entry_id:7707 raw_size:33280
2023/07/14 00:35:55.444 [PXE]  [15] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.444 [PXE]  [15] @@ locate wim file </sources/boot.wim> ...
2023/07/14 00:35:55.444 [PXE]  [5] 13272 33280 chunk_num=2
2023/07/14 00:35:55.444 [PXE]  [14] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.444 [PXE]  [14] @@ locate wim file </SSTR/strelec11x64Eng.wim> ...
2023/07/14 00:35:55.444 [PXE]  [5] last chunk_size:144 decompresslen:512 tot:33280
2023/07/14 00:35:55.444 [PXE]  [5] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.444 [PXE]  [15] @@@ overlen=8 overoff=590000 fe_entry_size_offset=589880 start_block=266 file_offset=9871360
2023/07/14 00:35:55.444 [PXE]  [14] @@@ overlen=8 overoff=4014312 fe_entry_size_offset=4014136 start_block=304 file_offset=771942400
2023/07/14 00:35:55.445 [PXE]  [15] 132800 486336 chunk_num=15
2023/07/14 00:35:55.445 [PXE]  [14] 292834 1112816 chunk_num=34
2023/07/14 00:35:55.445 [PXE]  [5] jump_exe_len:188416 bin_raw_len:1153776 bin_align_len:1155072
2023/07/14 00:35:55.445 [PXE]  [5] windows locate wim finish
2023/07/14 00:35:55.445 [PXE]  [5] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.445 [PXE]  [5] UDF fill override data ...
2023/07/14 00:35:55.445 [PXE]  [5] PdSizeOffset=71872 tagOffset=71680
2023/07/14 00:35:55.445 [PXE]  [5] UDF tag valid OK, should match it.
2023/07/14 00:35:55.445 [PXE]  [5] UDF tag refresh OK.
2023/07/14 00:35:55.445 [PXE]  [5] ## virt wim file </sources/boot.wim> <417133518> <New:424032256> ...
2023/07/14 00:35:55.445 [PXE]  [5] file_entry and extend data in the same block.
2023/07/14 00:35:55.445 [PXE]  [5] fix tag override 168[698384 - 698552] 698424 698368 56
2023/07/14 00:35:55.445 [PXE]  [5] find target file, name_len:24, offset: 728424, upadte hash
2023/07/14 00:35:55.446 [PXE]  [13] last chunk_size:2800 decompresslen:10848 tot:1059424
2023/07/14 00:35:55.446 [PXE]  [13] read lookup offset:480525387 size:262450
2023/07/14 00:35:55.446 [PXE]  [13] search pecmd.exe 000001E213A7F5A0
2023/07/14 00:35:55.446 [PXE]  [13] search reg SYSTEM 000001E213AD31C8
2023/07/14 00:35:55.446 [PXE]  [13] find system lookup entry_id:3097 raw_size:7602176
2023/07/14 00:35:55.446 [PXE]  [5] find target file, name_len:24, offset: 3353224, upadte hash
2023/07/14 00:35:55.447 [PXE]  [5] update replace lookup entry_id:7707
2023/07/14 00:35:55.447 [PXE]  [5] find meta lookup entry_id:1, update resource head and hash(5129128)
2023/07/14 00:35:55.447 [PXE]  [5] Virt data ISO file size: 4385144832 4809177088
2023/07/14 00:35:55.447 [PXE]  [5] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.447 [PXE]  [5]  <0> [ 71680 - 72192 512 ]
2023/07/14 00:35:55.447 [PXE]  [5]  <1> [ 698368 - 698880 512 ]
2023/07/14 00:35:55.447 [PXE]  [5] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.447 [PXE]  [5] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.447 [PXE]  [5]  <iso/Windows.11.Pro.22621.674.iso> WIM:1/1
2023/07/14 00:35:55.447 [PXE]  [5]  <01> [4385144832 - 4802279424 417134592 ] Remap
2023/07/14 00:35:55.447 [PXE]  [5]  <02> [4385144832 - 4385145040 208      ] Memory
2023/07/14 00:35:55.447 [PXE]  [5]  <03> [4802279424 - 4803434496 1155072  ] Memory
2023/07/14 00:35:55.447 [PXE]  [5]  <04> [4802467940 - 4802468964 1024      ] iVentoy Param
2023/07/14 00:35:55.447 [PXE]  [5]  <05> [4803434496 - 4808564736 5130240  ] Memory
2023/07/14 00:35:55.447 [PXE]  [5]  <06> [4804162920 - 4804162940 20        ] WIM BIN CHK
2023/07/14 00:35:55.447 [PXE]  [13] 1252840 7602176 chunk_num=232
2023/07/14 00:35:55.447 [PXE]  [5]  <07> [4806787720 - 4806787740 20        ] WIM BIN CHK
2023/07/14 00:35:55.447 [PXE]  [5]  <08> [4808564736 - 4809177088 612352    ] Memory
2023/07/14 00:35:55.447 [PXE]  [5]  <09> [4808950116 - 4808950136 20        ] WIM BIN CHK
2023/07/14 00:35:55.447 [PXE]  [5]  <10> [4808564816 - 4808564836 20        ] WIM META CHK
2023/07/14 00:35:55.447 [PXE]  [5] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.447 [PXE]  [5] Phase2 parse image <iso/Windows.11.Pro.22621.674.iso> finished success
2023/07/14 00:35:55.447 [PXE]  [15] last chunk_size:6370 decompresslen:27584 tot:486336
2023/07/14 00:35:55.447 [PXE]  [15] read lookup offset:264422723 size:112250
2023/07/14 00:35:55.448 [PXE]  [15] search pecmd.exe 000001E20A0811E8
2023/07/14 00:35:55.448 [PXE]  [15] search reg SYSTEM 000001E20A0924C8
2023/07/14 00:35:55.448 [PXE]  [15] find system lookup entry_id:1129 raw_size:6516736
2023/07/14 00:35:55.448 [PXE]  [14] last chunk_size:8156 decompresslen:31472 tot:1112816
2023/07/14 00:35:55.448 [PXE]  [14] read lookup offset:473604785 size:274150
2023/07/14 00:35:55.448 [PXE]  [14] search pecmd.exe 000001E213CFFDD0
2023/07/14 00:35:55.448 [PXE]  [14] search reg SYSTEM 000001E213D5ACD8
2023/07/14 00:35:55.448 [PXE]  [14] find system lookup entry_id:3256 raw_size:7471104
2023/07/14 00:35:55.448 [PXE]  [15] 987852 6516736 chunk_num=199
2023/07/14 00:35:55.449 [PXE]  [14] 1155746 7471104 chunk_num=228
2023/07/14 00:35:55.450 [PXE]  [12] last chunk_size:78 decompresslen:32768 tot:8126464
2023/07/14 00:35:55.450 [PXE]  [12] find registry cmdline i:1431632 offset:(0x15c870)1427568 size:(0x66)102
2023/07/14 00:35:55.450 [PXE]  [12] start offset is 0x15d874(1431668)
2023/07/14 00:35:55.451 [PXE]  [12] registry setup cmdline:<Pecmd.exe Main %Windir%\System32\serversharing.dll>
2023/07/14 00:35:55.451 [PXE]  [12] @ directly use pecmd.exe 000001E212B2D668
2023/07/14 00:35:55.451 [PXE]  [12] find replace file at 000001E212B2D668
2023/07/14 00:35:55.451 [PXE]  [12] search hash <0f1a5b9e812b436a11573da7c040c87a9e1e0457>
2023/07/14 00:35:55.451 [PXE]  [12] find replace lookup entry_id:4195 raw_size:1047040
2023/07/14 00:35:55.452 [PXE]  [12] 867182 1047040 chunk_num=32
2023/07/14 00:35:55.455 [PXE]  [12] last chunk_size:28492 decompresslen:31232 tot:1047040
2023/07/14 00:35:55.455 [PXE]  [12] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.456 [PXE]  [12] jump_exe_len:188416 bin_raw_len:2167536 bin_align_len:2168832
2023/07/14 00:35:55.456 [PXE]  [12] @@ locate wim file </ktv/10ktv86.wim> ...
2023/07/14 00:35:55.456 [PXE]  [12] @@@ overlen=8 overoff=737456 fe_entry_size_offset=737336 start_block=257 file_offset=982081536
2023/07/14 00:35:55.457 [PXE]  [12] 167076 682160 chunk_num=21
2023/07/14 00:35:55.459 [PXE]  [12] last chunk_size:5358 decompresslen:26800 tot:682160
2023/07/14 00:35:55.459 [PXE]  [12] read lookup offset:208637644 size:168000
2023/07/14 00:35:55.459 [PXE]  [12] search pecmd.exe 000001E21564BB28
2023/07/14 00:35:55.459 [PXE]  [12] search reg SYSTEM 000001E2156676C8
2023/07/14 00:35:55.459 [PXE]  [12] find system lookup entry_id:2323 raw_size:6029312
2023/07/14 00:35:55.460 [PXE]  [12] 868502 6029312 chunk_num=184
2023/07/14 00:35:55.464 [PXE]  [13] last chunk_size:78 decompresslen:32768 tot:7602176
2023/07/14 00:35:55.464 [PXE]  [15] last chunk_size:6490 decompresslen:28672 tot:6516736
2023/07/14 00:35:55.466 [PXE]  [15] find registry cmdline i:6508416 offset:(0x634020)6504480 size:(0x56)86
2023/07/14 00:35:55.466 [PXE]  [15] start offset is 0x635024(6508580)
2023/07/14 00:35:55.466 [PXE]  [13] find registry cmdline i:7352216 offset:(0x702020)7348256 size:(0x5e)94
2023/07/14 00:35:55.466 [PXE]  [13] start offset is 0x703024(7352356)
2023/07/14 00:35:55.467 [PXE]  [13] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.467 [PXE]  [13] @ directly use pecmd.exe 000001E213A7F5A0
2023/07/14 00:35:55.467 [PXE]  [13] find replace file at 000001E213A7F5A0
2023/07/14 00:35:55.467 [PXE]  [15] registry setup cmdline:<pecmd.exe main %windir%\System32\pecmd.ini>
2023/07/14 00:35:55.467 [PXE]  [15] @ directly use pecmd.exe 000001E20A0811E8
2023/07/14 00:35:55.467 [PXE]  [15] find replace file at 000001E20A0811E8
2023/07/14 00:35:55.467 [PXE]  [13] search hash <f7c447f2997dd329b62ad02756f55871cac1ad2d>
2023/07/14 00:35:55.467 [PXE]  [13] find replace lookup entry_id:1564 raw_size:1452544
2023/07/14 00:35:55.467 [PXE]  [15] search hash <0c744efec7418fc706aa3c7e2e3c102538375363>
2023/07/14 00:35:55.467 [PXE]  [15] find replace lookup entry_id:552 raw_size:894976
2023/07/14 00:35:55.467 [PXE]  [14] last chunk_size:7516 decompresslen:32768 tot:7471104
2023/07/14 00:35:55.468 [PXE]  [15] 861594 894976 chunk_num=28
2023/07/14 00:35:55.468 [PXE]  [13] 804250 1452544 chunk_num=45
2023/07/14 00:35:55.470 [PXE]  [14] find registry cmdline i:7462040 offset:(0x71ccb8)7457976 size:(0x5e)94
2023/07/14 00:35:55.470 [PXE]  [14] start offset is 0x71dcbc(7462076)
2023/07/14 00:35:55.470 [PXE]  [15] last chunk_size:8584 decompresslen:10240 tot:894976
2023/07/14 00:35:55.470 [PXE]  [15] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.470 [PXE]  [14] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.470 [PXE]  [14] @ directly use pecmd.exe 000001E213CFFDD0
2023/07/14 00:35:55.470 [PXE]  [14] find replace file at 000001E213CFFDD0
2023/07/14 00:35:55.470 [PXE]  [14] search hash <f75689748b78db45cd4a39455b2734eb8780974c>
2023/07/14 00:35:55.470 [PXE]  [14] find replace lookup entry_id:1613 raw_size:1453056
2023/07/14 00:35:55.471 [PXE]  [15] jump_exe_len:188416 bin_raw_len:2015472 bin_align_len:2017280
2023/07/14 00:35:55.471 [PXE]  [15] windows locate wim finish
2023/07/14 00:35:55.471 [PXE]  [15] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.471 [PXE]  [15] UDF fill override data ...
2023/07/14 00:35:55.471 [PXE]  [15] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.471 [PXE]  [15] UDF tag valid OK, should match it.
2023/07/14 00:35:55.471 [PXE]  [14] 804374 1453056 chunk_num=45
2023/07/14 00:35:55.471 [PXE]  [15] UDF tag refresh OK.
2023/07/14 00:35:55.471 [PXE]  [15] ## virt wim file </sources/boot.wim> <264536951> <New:267155456> ...
2023/07/14 00:35:55.471 [PXE]  [15] file_entry and extend data in the same block.
2023/07/14 00:35:55.471 [PXE]  [15] fix tag override 168[589840 - 590008] 589880 589824 56
2023/07/14 00:35:55.471 [PXE]  [15] find target file, name_len:18, offset: 151816, upadte hash
2023/07/14 00:35:55.471 [PXE]  [15] update replace lookup entry_id:552
2023/07/14 00:35:55.471 [PXE]  [15] find meta lookup entry_id:0, update resource head and hash(486336)
2023/07/14 00:35:55.471 [PXE]  [15] Virt data ISO file size: 274432000 541587456
2023/07/14 00:35:55.471 [PXE]  [15] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.471 [PXE]  [15]  <0> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.471 [PXE]  [15]  <1> [ 589824 - 590336 512 ]
2023/07/14 00:35:55.472 [PXE]  [15] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.472 [PXE]  [15] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.472 [PXE]  [15]  <iso/Xemom-Windows_11_PE_x64_En.iso> WIM:1/1
2023/07/14 00:35:55.472 [PXE]  [15]  <01> [274432000 - 538970112 264538112 ] Remap
2023/07/14 00:35:55.472 [PXE]  [15]  <02> [274432000 - 274432208 208      ] Memory
2023/07/14 00:35:55.472 [PXE]  [15]  <03> [538970112 - 540987392 2017280  ] Memory
2023/07/14 00:35:55.472 [PXE]  [15]  <04> [539158628 - 539159652 1024      ] iVentoy Param
2023/07/14 00:35:55.472 [PXE]  [15]  <05> [540987392 - 541474816 487424    ] Memory
2023/07/14 00:35:55.472 [PXE]  [15]  <06> [541139208 - 541139228 20        ] WIM BIN CHK
2023/07/14 00:35:55.472 [PXE]  [15]  <07> [541474816 - 541587456 112640    ] Memory
2023/07/14 00:35:55.472 [PXE]  [15]  <08> [541502446 - 541502466 20        ] WIM BIN CHK
2023/07/14 00:35:55.472 [PXE]  [15]  <09> [541474846 - 541474866 20        ] WIM META CHK
2023/07/14 00:35:55.472 [PXE]  [15] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.472 [PXE]  [15] Phase2 parse image <iso/Xemom-Windows_11_PE_x64_En.iso> finished success
2023/07/14 00:35:55.472 [PXE]  [12] last chunk_size:78 decompresslen:32768 tot:6029312
2023/07/14 00:35:55.473 [PXE]  [12] find registry cmdline i:246616 offset:(0x46e640)4646464 size:(0x66)102
2023/07/14 00:35:55.473 [PXE]  [12] start offset is 0x46f644(4650564)
2023/07/14 00:35:55.473 [PXE]  [12] registry setup cmdline:<Pecmd.exe Main %Windir%\System32\networkshared.dll>
2023/07/14 00:35:55.473 [PXE]  [12] @ directly use pecmd.exe 000001E21564BB28
2023/07/14 00:35:55.473 [PXE]  [12] find replace file at 000001E21564BB28
2023/07/14 00:35:55.473 [PXE]  [12] search hash <e0a44711085e63c93f57f691f6115c7588fffbde>
2023/07/14 00:35:55.473 [PXE]  [12] find replace lookup entry_id:2397 raw_size:822272
2023/07/14 00:35:55.474 [PXE]  [12] 736832 822272 chunk_num=26
2023/07/14 00:35:55.475 [PXE]  [13] last chunk_size:3068 decompresslen:10752 tot:1452544
2023/07/14 00:35:55.475 [PXE]  [13] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.476 [PXE]  [12] last chunk_size:1956 decompresslen:3072 tot:822272
2023/07/14 00:35:55.476 [PXE]  [12] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.476 [PXE]  [13] jump_exe_len:188416 bin_raw_len:2573040 bin_align_len:2574336
2023/07/14 00:35:55.476 [PXE]  [13] @@ locate wim file </SSTR/strelec10x64Eng.wim> ...
2023/07/14 00:35:55.476 [PXE]  [13] @@@ overlen=8 overoff=4010216 fe_entry_size_offset=4010040 start_block=304 file_offset=324292608
2023/07/14 00:35:55.477 [PXE]  [12] jump_exe_len:155648 bin_raw_len:1910000 bin_align_len:1910784
2023/07/14 00:35:55.477 [PXE]  [13] 280062 1048480 chunk_num=32
2023/07/14 00:35:55.477 [PXE]  [12] windows locate wim finish
2023/07/14 00:35:55.477 [PXE]  [12] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.477 [PXE]  [12] UDF fill override data ...
2023/07/14 00:35:55.477 [PXE]  [12] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.477 [PXE]  [12] UDF tag valid OK, should match it.
2023/07/14 00:35:55.477 [PXE]  [12] UDF tag refresh OK.
2023/07/14 00:35:55.477 [PXE]  [12] ## virt wim file </ktv/10ktv64.wim> <418382741> <New:422123520> ...
2023/07/14 00:35:55.477 [PXE]  [12] file_entry and extend data in the same block.
2023/07/14 00:35:55.477 [PXE]  [12] fix tag override 168[735248 - 735416] 735288 735232 56
2023/07/14 00:35:55.477 [PXE]  [12] ## virt wim file </ktv/10ktv86.wim> <208807614> <New:211572736> ...
2023/07/14 00:35:55.477 [PXE]  [12] file_entry and extend data in the same block.
2023/07/14 00:35:55.478 [PXE]  [12] fix tag override 168[737296 - 737464] 737336 737280 56
2023/07/14 00:35:55.478 [PXE]  [12] find target file, name_len:18, offset: 558696, upadte hash
2023/07/14 00:35:55.478 [PXE]  [12] update replace lookup entry_id:4195
2023/07/14 00:35:55.478 [PXE]  [12] find meta lookup entry_id:0, update resource head and hash(1309216)
2023/07/14 00:35:55.478 [PXE]  [12] find target file, name_len:18, offset: 178920, upadte hash
2023/07/14 00:35:55.478 [PXE]  [12] update replace lookup entry_id:2397
2023/07/14 00:35:55.478 [PXE]  [12] find meta lookup entry_id:0, update resource head and hash(682160)
2023/07/14 00:35:55.478 [PXE]  [12] Virt data ISO file size: 2370863104 3004559360
2023/07/14 00:35:55.478 [PXE]  [12] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.478 [PXE]  [12]  <0> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.478 [PXE]  [12]  <1> [ 735232 - 735744 512 ]
2023/07/14 00:35:55.478 [PXE]  [12]  <2> [ 737280 - 737792 512 ]
2023/07/14 00:35:55.478 [PXE]  [12] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.478 [PXE]  [12] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.478 [PXE]  [12]  <iso/WinPE10Ktv-v5.3-Autumn-Free-2022.ISO> WIM:2/2
2023/07/14 00:35:55.478 [PXE]  [12]  <01> [2370863104 - 2789246976 418383872 ] Remap
2023/07/14 00:35:55.478 [PXE]  [12]  <02> [2370863104 - 2370863312 208      ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <03> [2789246976 - 2791415808 2168832  ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <04> [2789435492 - 2789436516 1024      ] iVentoy Param
2023/07/14 00:35:55.478 [PXE]  [12]  <05> [2791415808 - 2792726528 1310720  ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <06> [2791974504 - 2791974524 20        ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE]  [12]  <07> [2792726528 - 2792986624 260096    ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <08> [2792936308 - 2792936328 20        ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE]  [12]  <09> [2792726558 - 2792726578 20        ] WIM META CHK
2023/07/14 00:35:55.478 [PXE]  [12]  <10> [2792986624 - 3001794560 208807936 ] Remap
2023/07/14 00:35:55.478 [PXE]  [12]  <11> [2792986624 - 2792986832 208      ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <12> [3001794560 - 3003705344 1910784  ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <13> [3001950308 - 3001951332 1024      ] iVentoy Param
2023/07/14 00:35:55.478 [PXE]  [12]  <14> [3003705344 - 3004389376 684032    ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <15> [3003884264 - 3003884284 20        ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE]  [12]  <16> [3004389376 - 3004559360 169984    ] Memory
2023/07/14 00:35:55.478 [PXE]  [12]  <17> [3004509256 - 3004509276 20        ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE]  [12]  <18> [3004389406 - 3004389426 20        ] WIM META CHK
2023/07/14 00:35:55.478 [PXE]  [12] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.478 [PXE]  [12] Phase2 parse image <iso/WinPE10Ktv-v5.3-Autumn-Free-2022.ISO> finished success
2023/07/14 00:35:55.478 [PXE]  [14] last chunk_size:3188 decompresslen:11264 tot:1453056
2023/07/14 00:35:55.478 [PXE]  [14] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.479 [PXE]  [14] jump_exe_len:188416 bin_raw_len:2573552 bin_align_len:2574336
2023/07/14 00:35:55.479 [PXE]  [14] @@ locate wim file </SSTR/strelec10x64Eng.wim> ...
2023/07/14 00:35:55.479 [PXE]  [14] @@@ overlen=8 overoff=4012264 fe_entry_size_offset=4012088 start_block=304 file_offset=317902848
2023/07/14 00:35:55.479 [PXE]  [13] last chunk_size:8120 decompresslen:32672 tot:1048480
2023/07/14 00:35:55.479 [PXE]  [13] read lookup offset:465305468 size:266950
2023/07/14 00:35:55.479 [PXE]  [14] 281762 1050704 chunk_num=33
2023/07/14 00:35:55.480 [PXE]  [13] search pecmd.exe 000001E213075AB0
2023/07/14 00:35:55.480 [PXE]  [13] search reg SYSTEM 000001E2130BB1B0
2023/07/14 00:35:55.480 [PXE]  [13] find system lookup entry_id:2928 raw_size:7864320
2023/07/14 00:35:55.480 [PXE]  [13] 1142840 7864320 chunk_num=240
2023/07/14 00:35:55.482 [PXE]  [14] last chunk_size:810 decompresslen:2128 tot:1050704
2023/07/14 00:35:55.482 [PXE]  [14] read lookup offset:453769671 size:267550
2023/07/14 00:35:55.482 [PXE]  [14] search pecmd.exe 000001E212C6F9D8
2023/07/14 00:35:55.482 [PXE]  [14] search reg SYSTEM 000001E212CB5198
2023/07/14 00:35:55.482 [PXE]  [14] find system lookup entry_id:2931 raw_size:7626752
2023/07/14 00:35:55.483 [PXE]  [14] 1141418 7626752 chunk_num=233
2023/07/14 00:35:55.494 [PXE]  [13] last chunk_size:78 decompresslen:32768 tot:7864320
2023/07/14 00:35:55.496 [PXE]  [13] find registry cmdline i:7614624 offset:(0x7420c0)7610560 size:(0x5e)94
2023/07/14 00:35:55.496 [PXE]  [13] start offset is 0x7430c4(7614660)
2023/07/14 00:35:55.496 [PXE]  [13] registry setup cmdline:<Pecmd.exe Main %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.496 [PXE]  [13] @ directly use pecmd.exe 000001E213075AB0
2023/07/14 00:35:55.496 [PXE]  [13] find replace file at 000001E213075AB0
2023/07/14 00:35:55.496 [PXE]  [13] search hash <f7c447f2997dd329b62ad02756f55871cac1ad2d>
2023/07/14 00:35:55.496 [PXE]  [13] find replace lookup entry_id:1596 raw_size:1452544
2023/07/14 00:35:55.497 [PXE]  [13] 804250 1452544 chunk_num=45
2023/07/14 00:35:55.497 [PXE]  [14] last chunk_size:5636 decompresslen:24576 tot:7626752
2023/07/14 00:35:55.499 [PXE]  [14] find registry cmdline i:7617984 offset:(0x742de0)7613920 size:(0x5e)94
2023/07/14 00:35:55.499 [PXE]  [14] start offset is 0x743de4(7618020)
2023/07/14 00:35:55.504 [PXE]  [13] last chunk_size:3068 decompresslen:10752 tot:1452544
2023/07/14 00:35:55.504 [PXE]  [13] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.516 [PXE]  [14] registry setup cmdline:<Pecmd.exe Main %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.516 [PXE]  [14] @ directly use pecmd.exe 000001E212C6F9D8
2023/07/14 00:35:55.516 [PXE]  [14] find replace file at 000001E212C6F9D8
2023/07/14 00:35:55.516 [PXE]  [14] search hash <f75689748b78db45cd4a39455b2734eb8780974c>
2023/07/14 00:35:55.516 [PXE]  [14] find replace lookup entry_id:1596 raw_size:1453056
2023/07/14 00:35:55.516 [PXE]  [13] jump_exe_len:188416 bin_raw_len:2573040 bin_align_len:2574336
2023/07/14 00:35:55.516 [PXE]  [13] @@ locate wim file </SSTR/strelec8Eng.wim> ...
2023/07/14 00:35:55.517 [PXE]  [13] @@@ overlen=8 overoff=4014312 fe_entry_size_offset=4014136 start_block=304 file_offset=1270659072
2023/07/14 00:35:55.517 [PXE]  [14] 804374 1453056 chunk_num=45
2023/07/14 00:35:55.517 [PXE]  [13] 212290 863040 chunk_num=27
2023/07/14 00:35:55.519 [PXE]  [13] last chunk_size:2590 decompresslen:11072 tot:863040
2023/07/14 00:35:55.519 [PXE]  [13] read lookup offset:254133947 size:217750
2023/07/14 00:35:55.520 [PXE]  [13] search pecmd.exe 000001E213E6A4C0
2023/07/14 00:35:55.520 [PXE]  [13] search reg SYSTEM 000001E213E99428
2023/07/14 00:35:55.520 [PXE]  [13] find system lookup entry_id:4349 raw_size:4194304
2023/07/14 00:35:55.520 [PXE]  [13] 637878 4194304 chunk_num=128
2023/07/14 00:35:55.523 [PXE]  [14] last chunk_size:3188 decompresslen:11264 tot:1453056
2023/07/14 00:35:55.523 [PXE]  [14] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.524 [PXE]  [14] jump_exe_len:188416 bin_raw_len:2573552 bin_align_len:2574336
2023/07/14 00:35:55.524 [PXE]  [14] @@ locate wim file </SSTR/strelec8Eng.wim> ...
2023/07/14 00:35:55.524 [PXE]  [14] @@@ overlen=8 overoff=4016360 fe_entry_size_offset=4016184 start_block=304 file_offset=1245825024
2023/07/14 00:35:55.525 [PXE]  [14] 212108 860592 chunk_num=27
2023/07/14 00:35:55.526 [PXE]  [14] last chunk_size:2108 decompresslen:8624 tot:860592
2023/07/14 00:35:55.526 [PXE]  [14] read lookup offset:248154096 size:217350
2023/07/14 00:35:55.526 [PXE]  [14] search pecmd.exe 000001E213F80EA8
2023/07/14 00:35:55.527 [PXE]  [14] search reg SYSTEM 000001E213FAFF10
2023/07/14 00:35:55.527 [PXE]  [14] find system lookup entry_id:4340 raw_size:4124672
2023/07/14 00:35:55.527 [PXE]  [14] 644574 4124672 chunk_num=126
2023/07/14 00:35:55.528 [PXE]  [13] last chunk_size:78 decompresslen:32768 tot:4194304
2023/07/14 00:35:55.528 [PXE]  [13] find registry cmdline i:237480 offset:(0x38fc8)233416 size:(0x56)86
2023/07/14 00:35:55.528 [PXE]  [13] start offset is 0x39fcc(237516)
2023/07/14 00:35:55.529 [PXE]  [13] registry setup cmdline:<PECMD.EXE MAIN %WinDir%\system32\PECMD.INI>
2023/07/14 00:35:55.529 [PXE]  [13] @ directly use pecmd.exe 000001E213E6A4C0
2023/07/14 00:35:55.529 [PXE]  [13] find replace file at 000001E213E6A4C0
2023/07/14 00:35:55.529 [PXE]  [13] search hash <5ffc19ca0ba44aa2c44b31c0c2d7d36270c58fbd>
2023/07/14 00:35:55.529 [PXE]  [13] find replace lookup entry_id:1781 raw_size:1084928
2023/07/14 00:35:55.529 [PXE]  [13] 668374 1084928 chunk_num=34
2023/07/14 00:35:55.534 [PXE]  [13] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.534 [PXE]  [13] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.535 [PXE]  [13] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.535 [PXE]  [13] @@ locate wim file </SSTR/strelec10Eng.wim> ...
2023/07/14 00:35:55.535 [PXE]  [14] last chunk_size:6314 decompresslen:28672 tot:4124672
2023/07/14 00:35:55.536 [PXE]  [13] @@@ overlen=8 overoff=4008168 fe_entry_size_offset=4007992 start_block=304 file_offset=11925504
2023/07/14 00:35:55.536 [PXE]  [13] 285718 1155424 chunk_num=36
2023/07/14 00:35:55.536 [PXE]  [14] find registry cmdline i:4117088 offset:(0x3ec280)4113024 size:(0x56)86
2023/07/14 00:35:55.537 [PXE]  [14] start offset is 0x3ed284(4117124)
2023/07/14 00:35:55.537 [PXE]  [14] registry setup cmdline:<PECMD.EXE MAIN %WinDir%\system32\PECMD.INI>
2023/07/14 00:35:55.537 [PXE]  [14] @ directly use pecmd.exe 000001E213F80EA8
2023/07/14 00:35:55.537 [PXE]  [14] find replace file at 000001E213F80EA8
2023/07/14 00:35:55.537 [PXE]  [14] search hash <dfee9ace54bae8964d7243ee5b3e388a22fbc7be>
2023/07/14 00:35:55.537 [PXE]  [14] find replace lookup entry_id:1776 raw_size:1084928
2023/07/14 00:35:55.537 [PXE]  [14] 668508 1084928 chunk_num=34
2023/07/14 00:35:55.538 [PXE]  [13] last chunk_size:2316 decompresslen:8544 tot:1155424
2023/07/14 00:35:55.538 [PXE]  [13] read lookup offset:312098248 size:265500
2023/07/14 00:35:55.539 [PXE]  [13] search pecmd.exe 000001E214A08278
2023/07/14 00:35:55.539 [PXE]  [13] search reg SYSTEM 000001E214A60290
2023/07/14 00:35:55.539 [PXE]  [13] find system lookup entry_id:3249 raw_size:5767168
2023/07/14 00:35:55.539 [PXE]  [13] 865670 5767168 chunk_num=176
2023/07/14 00:35:55.542 [PXE]  [14] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.542 [PXE]  [14] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.542 [PXE]  [14] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.542 [PXE]  [14] @@ locate wim file </SSTR/strelec10Eng.wim> ...
2023/07/14 00:35:55.543 [PXE]  [14] @@@ overlen=8 overoff=4010216 fe_entry_size_offset=4010040 start_block=304 file_offset=11986944
2023/07/14 00:35:55.543 [PXE]  [14] 284724 1151384 chunk_num=36
2023/07/14 00:35:55.546 [PXE]  [14] last chunk_size:1352 decompresslen:4504 tot:1151384
2023/07/14 00:35:55.546 [PXE]  [14] read lookup offset:305648208 size:265050
2023/07/14 00:35:55.546 [PXE]  [14] search pecmd.exe 000001E214DE6CB0
2023/07/14 00:35:55.546 [PXE]  [14] search reg SYSTEM 000001E214E3ECD8
2023/07/14 00:35:55.546 [PXE]  [14] find system lookup entry_id:3247 raw_size:5742592
2023/07/14 00:35:55.547 [PXE]  [14] 870464 5742592 chunk_num=176
2023/07/14 00:35:55.550 [PXE]  [13] last chunk_size:2182 decompresslen:32768 tot:5767168
2023/07/14 00:35:55.550 [PXE]  [13] find registry cmdline i:278184 offset:(0x43178)274808 size:(0x5e)94
2023/07/14 00:35:55.550 [PXE]  [13] start offset is 0x4417c(278908)
2023/07/14 00:35:55.551 [PXE]  [13] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.551 [PXE]  [13] @ directly use pecmd.exe 000001E214A08278
2023/07/14 00:35:55.551 [PXE]  [13] find replace file at 000001E214A08278
2023/07/14 00:35:55.551 [PXE]  [13] search hash <5ffc19ca0ba44aa2c44b31c0c2d7d36270c58fbd>
2023/07/14 00:35:55.551 [PXE]  [13] find replace lookup entry_id:1717 raw_size:1084928
2023/07/14 00:35:55.552 [PXE]  [13] 668374 1084928 chunk_num=34
2023/07/14 00:35:55.556 [PXE]  [13] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.556 [PXE]  [13] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.557 [PXE]  [13] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.557 [PXE]  [13] @@ locate wim file </SSTR/strelec8NEEng.wim> ...
2023/07/14 00:35:55.557 [PXE]  [13] @@@ overlen=8 overoff=4016360 fe_entry_size_offset=4016184 start_block=304 file_offset=1525016576
2023/07/14 00:35:55.557 [PXE]  [13] 10760 36184 chunk_num=2
2023/07/14 00:35:55.557 [PXE]  [13] last chunk_size:1036 decompresslen:3416 tot:36184
2023/07/14 00:35:55.557 [PXE]  [13] read lookup offset:17893577 size:10450
2023/07/14 00:35:55.558 [PXE]  [13] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.558 [PXE]  [13] search winpeshl.exe 0000000000000000
2023/07/14 00:35:55.558 [PXE]  [13] Failed to find replace file 0000000000000000
2023/07/14 00:35:55.558 [PXE]  [13] windows locate wim finish
2023/07/14 00:35:55.558 [PXE]  [13] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.558 [PXE]  [13] UDF fill override data ...
2023/07/14 00:35:55.558 [PXE]  [13] PdSizeOffset=530624 tagOffset=530432
2023/07/14 00:35:55.558 [PXE]  [13] UDF tag valid OK, should match it.
2023/07/14 00:35:55.558 [PXE]  [13] UDF tag refresh OK.
2023/07/14 00:35:55.558 [PXE]  [13] ## virt wim file </SSTR/strelec11x64Eng.wim> <480790081> <New:484689920> ...
2023/07/14 00:35:55.558 [PXE]  [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.558 [PXE]  [13] fix tag override 224[4012048 - 4012272] 4012088 4012032 56
2023/07/14 00:35:55.558 [PXE]  [13] ## virt wim file </SSTR/strelec10x64Eng.wim> <465574664> <New:469467136> ...
2023/07/14 00:35:55.558 [PXE]  [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.558 [PXE]  [13] fix tag override 224[4010000 - 4010224] 4010040 4009984 56
2023/07/14 00:35:55.558 [PXE]  [13] ## virt wim file </SSTR/strelec8Eng.wim> <254356707> <New:257613824> ...
2023/07/14 00:35:55.558 [PXE]  [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.558 [PXE]  [14] last chunk_size:2276 decompresslen:8192 tot:5742592
2023/07/14 00:35:55.558 [PXE]  [13] fix tag override 224[4014096 - 4014320] 4014136 4014080 56
2023/07/14 00:35:55.558 [PXE]  [13] ## virt wim file </SSTR/strelec10Eng.wim> <312366044> <New:315963392> ...
2023/07/14 00:35:55.558 [PXE]  [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.559 [PXE]  [13] fix tag override 224[4007952 - 4008176] 4007992 4007936 56
2023/07/14 00:35:55.559 [PXE]  [13] find target file, name_len:18, offset: 251296, upadte hash
2023/07/14 00:35:55.559 [PXE]  [13] find target file, name_len:18, offset: 1015536, upadte hash
2023/07/14 00:35:55.559 [PXE]  [13] update replace lookup entry_id:1564
2023/07/14 00:35:55.559 [PXE]  [13] find meta lookup entry_id:0, update resource head and hash(1059424)
2023/07/14 00:35:55.559 [PXE]  [13] find target file, name_len:18, offset: 252592, upadte hash
2023/07/14 00:35:55.559 [PXE]  [13] find target file, name_len:18, offset: 1001384, upadte hash
2023/07/14 00:35:55.559 [PXE]  [13] update replace lookup entry_id:1596
2023/07/14 00:35:55.559 [PXE]  [13] find meta lookup entry_id:0, update resource head and hash(1048480)
2023/07/14 00:35:55.559 [PXE]  [13] find target file, name_len:18, offset: 296128, upadte hash
2023/07/14 00:35:55.559 [PXE]  [13] update replace lookup entry_id:1781
2023/07/14 00:35:55.559 [PXE]  [13] find meta lookup entry_id:4, update resource head and hash(863040)
2023/07/14 00:35:55.559 [PXE]  [13] find target file, name_len:18, offset: 291448, upadte hash
2023/07/14 00:35:55.559 [PXE]  [13] update replace lookup entry_id:1717
2023/07/14 00:35:55.559 [PXE]  [13] find meta lookup entry_id:0, update resource head and hash(1155424)
2023/07/14 00:35:55.559 [PXE]  [13] Virt data ISO file size: 4909305856 6437040128
2023/07/14 00:35:55.559 [PXE]  [13] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.559 [PXE]  [13]  <0> [ 530432 - 530944 512 ]
2023/07/14 00:35:55.559 [PXE]  [13]  <1> [ 4012032 - 4012544 512 ]
2023/07/14 00:35:55.559 [PXE]  [13]  <2> [ 4009984 - 4010496 512 ]
2023/07/14 00:35:55.559 [PXE]  [13]  <3> [ 4014080 - 4014592 512 ]
2023/07/14 00:35:55.559 [PXE]  [13]  <4> [ 4007936 - 4008448 512 ]
2023/07/14 00:35:55.560 [PXE]  [13] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.560 [PXE]  [13] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.560 [PXE]  [13]  <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.03.21_English.iso> WIM:4/5
2023/07/14 00:35:55.560 [PXE]  [13]  <01> [4909305856 - 5390096384 480790528 ] Remap
2023/07/14 00:35:55.560 [PXE]  [13]  <02> [4909305856 - 4909306064 208      ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <03> [5390096384 - 5392670720 2574336  ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <04> [5390284900 - 5390285924 1024      ] iVentoy Param
2023/07/14 00:35:55.560 [PXE]  [13]  <05> [5392670720 - 5393731584 1060864  ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <06> [5392922016 - 5392922036 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <07> [5393686256 - 5393686276 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <08> [5393731584 - 5393995776 264192    ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <09> [5393809814 - 5393809834 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <10> [5393731614 - 5393731634 20        ] WIM META CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <11> [5393995776 - 5859571712 465575936 ] Remap
2023/07/14 00:35:55.560 [PXE]  [13]  <12> [5393995776 - 5393995984 208      ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <13> [5859571712 - 5862146048 2574336  ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <14> [5859760228 - 5859761252 1024      ] iVentoy Param
2023/07/14 00:35:55.560 [PXE]  [13]  <15> [5862146048 - 5863194624 1048576  ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <16> [5862398640 - 5862398660 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <17> [5863147432 - 5863147452 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <18> [5863194624 - 5863462912 268288    ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <19> [5863274454 - 5863274474 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <20> [5863194654 - 5863194674 20        ] WIM META CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <21> [5863462912 - 6117820416 254357504 ] Remap
2023/07/14 00:35:55.560 [PXE]  [13]  <22> [5863462912 - 5863463120 208      ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <23> [6117820416 - 6119993344 2172928  ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <24> [6117976164 - 6117977188 1024      ] iVentoy Param
2023/07/14 00:35:55.560 [PXE]  [13]  <25> [6119993344 - 6120857600 864256    ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <26> [6120289472 - 6120289492 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <27> [6120857600 - 6121076736 219136    ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <28> [6120946680 - 6120946700 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <29> [6120857830 - 6120857850 20        ] WIM META CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <30> [6121076736 - 6433443840 312367104 ] Remap
2023/07/14 00:35:55.560 [PXE]  [13]  <31> [6121076736 - 6121076944 208      ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <32> [6433443840 - 6435616768 2172928  ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <33> [6433599588 - 6433600612 1024      ] iVentoy Param
2023/07/14 00:35:55.560 [PXE]  [13]  <34> [6435616768 - 6436773888 1157120  ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <35> [6435908216 - 6435908236 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <36> [6436773888 - 6437040128 266240    ] Memory
2023/07/14 00:35:55.560 [PXE]  [13]  <37> [6436859768 - 6436859788 20        ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE]  [13]  <38> [6436773918 - 6436773938 20        ] WIM META CHK
2023/07/14 00:35:55.560 [PXE]  [13] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.560 [PXE]  [13] Phase2 parse image <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.03.21_English.iso> finished success
2023/07/14 00:35:55.560 [PXE]  [14] find registry cmdline i:5734528 offset:(0x5773f8)5731320 size:(0x5e)94
2023/07/14 00:35:55.560 [PXE]  [14] start offset is 0x5783fc(5735420)
2023/07/14 00:35:55.560 [PXE]  [14] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.560 [PXE]  [14] @ directly use pecmd.exe 000001E214DE6CB0
2023/07/14 00:35:55.560 [PXE]  [14] find replace file at 000001E214DE6CB0
2023/07/14 00:35:55.560 [PXE]  [14] search hash <dfee9ace54bae8964d7243ee5b3e388a22fbc7be>
2023/07/14 00:35:55.560 [PXE]  [14] find replace lookup entry_id:1713 raw_size:1084928
2023/07/14 00:35:55.561 [PXE]  [14] 668508 1084928 chunk_num=34
2023/07/14 00:35:55.566 [PXE]  [14] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.566 [PXE]  [14] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.566 [PXE]  [14] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.566 [PXE]  [14] @@ locate wim file </SSTR/strelec8NEEng.wim> ...
2023/07/14 00:35:55.566 [PXE]  [14] @@@ overlen=8 overoff=4018408 fe_entry_size_offset=4018232 start_block=304 file_offset=1494202368
2023/07/14 00:35:55.566 [PXE]  [14] 10774 36184 chunk_num=2
2023/07/14 00:35:55.567 [PXE]  [14] last chunk_size:1036 decompresslen:3416 tot:36184
2023/07/14 00:35:55.567 [PXE]  [14] read lookup offset:17893591 size:10450
2023/07/14 00:35:55.567 [PXE]  [14] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.567 [PXE]  [14] search winpeshl.exe 0000000000000000
2023/07/14 00:35:55.567 [PXE]  [14] Failed to find replace file 0000000000000000
2023/07/14 00:35:55.567 [PXE]  [14] windows locate wim finish
2023/07/14 00:35:55.567 [PXE]  [14] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.567 [PXE]  [14] UDF fill override data ...
2023/07/14 00:35:55.567 [PXE]  [14] PdSizeOffset=530624 tagOffset=530432
2023/07/14 00:35:55.567 [PXE]  [14] UDF tag valid OK, should match it.
2023/07/14 00:35:55.567 [PXE]  [14] UDF tag refresh OK.
2023/07/14 00:35:55.567 [PXE]  [14] ## virt wim file </SSTR/strelec11x64Eng.wim> <473881169> <New:477845504> ...
2023/07/14 00:35:55.567 [PXE]  [14] file_entry and extend data in the same block.
2023/07/14 00:35:55.567 [PXE]  [14] fix tag override 224[4014096 - 4014320] 4014136 4014080 56
2023/07/14 00:35:55.567 [PXE]  [14] ## virt wim file </SSTR/strelec10x64Eng.wim> <454039467> <New:457934848> ...
2023/07/14 00:35:55.567 [PXE]  [14] file_entry and extend data in the same block.
2023/07/14 00:35:55.567 [PXE]  [14] fix tag override 224[4012048 - 4012272] 4012088 4012032 56
2023/07/14 00:35:55.567 [PXE]  [14] ## virt wim file </SSTR/strelec8Eng.wim> <248376456> <New:251631616> ...
2023/07/14 00:35:55.567 [PXE]  [14] file_entry and extend data in the same block.
Reply


Messages In This Thread
iVentoy Service doesn't starting - by Oma Voss - 07-09-2023, 10:02 PM
RE: iVentoy Service doesn't starting - by Oma Voss - 07-13-2023, 10:43 PM

Forum Jump:


Users browsing this thread: 5 Guest(s)