Posts: 6
Threads: 2
Joined: Jun 2023
Reputation:
0
07-09-2023, 10:02 PM
(This post was last modified: 07-09-2023, 10:07 PM by Oma Voss.)
Hello,
Here is a Windows11 machine on which I want to start IVentoy. So I start iVentoy_64.exe after unpacking the downloaded zip file. Immediately afterwards, the iVentoy service starts without any problems. Then I select "exit" in the iVentoy menu, after which I try to restart iVentoy_64.exe, but unfortunately I always get the message "Starting . . .please wait . . . Service unavailable, the page will close!" Even after a restart of the Windows11 machine, the result persists unchanged, thei service cannot be started.
What can I do? I have tried to restart the iVentoy system since version 1.0.04 until 1.0.09 without success. The Defender or the firewall has been set to allow contact with the Internet, also without success.
So I need some help and support, thank you very much.
Translated with DeepL
Posts: 1,358
Threads: 86
Joined: Apr 2020
Reputation:
133
Please upload the log.txt file.
Posts: 6
Threads: 2
Joined: Jun 2023
Reputation:
0
(07-10-2023, 12:39 AM)longpanda Wrote: Please upload the log.txt file. Here it is;: - The message is too long. Please enter a message shorter than 65535 characters (currently 260611).
Post a New Reply
Code: 2023/07/14 00:35:55.429 [PXE] [8] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.429 [PXE] [8] search winpeshl.exe 000001E210077990
2023/07/14 00:35:55.429 [PXE] [8] find replace file at 000001E210077990
2023/07/14 00:35:55.429 [PXE] [8] search hash <6f61a75215e3c22de19bb350c92e3863494acfaa>
2023/07/14 00:35:55.429 [PXE] [8] find replace lookup entry_id:2634 raw_size:32256
2023/07/14 00:35:55.429 [PXE] [8] 13176 32256 chunk_num=1
2023/07/14 00:35:55.429 [PXE] [11] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.429 [PXE] [11] @@ locate wim file </sources/boot.wim> ...
2023/07/14 00:35:55.429 [PXE] [12] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.429 [PXE] [12] @@ locate wim file </ktv/10ktv64.wim> ...
2023/07/14 00:35:55.429 [PXE] [8] last chunk_size:13176 decompresslen:32256 tot:32256
2023/07/14 00:35:55.429 [PXE] [8] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.429 [PXE] [11] @@@ overlen=8 overoff=764080 fe_entry_size_offset=763960 start_block=257 file_offset=20488192
2023/07/14 00:35:55.429 [PXE] [12] @@@ overlen=8 overoff=735408 fe_entry_size_offset=735288 start_block=257 file_offset=1952462848
2023/07/14 00:35:55.430 [PXE] [12] 288730 1309216 chunk_num=40
2023/07/14 00:35:55.430 [PXE] [4] 973028 5126568 chunk_num=157
2023/07/14 00:35:55.430 [PXE] [10] 1007492 5132896 chunk_num=157
2023/07/14 00:35:55.430 [PXE] [11] 1085808 5685408 chunk_num=174
2023/07/14 00:35:55.433 [PXE] [12] last chunk_size:6098 decompresslen:31264 tot:1309216
2023/07/14 00:35:55.433 [PXE] [12] read lookup offset:418122133 size:258650
2023/07/14 00:35:55.433 [PXE] [12] search pecmd.exe 000001E212B2D668
2023/07/14 00:35:55.433 [PXE] [12] search reg SYSTEM 000001E212B54250
2023/07/14 00:35:55.433 [PXE] [12] find system lookup entry_id:4963 raw_size:8126464
2023/07/14 00:35:55.434 [PXE] [12] 1148308 8126464 chunk_num=248
2023/07/14 00:35:55.438 [PXE] [9] last chunk_size:3894 decompresslen:13616 tot:5322032
2023/07/14 00:35:55.438 [PXE] [9] read lookup offset:309024079 size:669150
2023/07/14 00:35:55.439 [PXE] [9] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.439 [PXE] [9] search winpeshl.exe 000001E210F8FE98
2023/07/14 00:35:55.439 [PXE] [9] find replace file at 000001E210F8FE98
2023/07/14 00:35:55.439 [PXE] [9] search hash <537aeaab7b0818885f8c1b54fd73a12050a22836>
2023/07/14 00:35:55.439 [PXE] [9] find replace lookup entry_id:1954 raw_size:541184
2023/07/14 00:35:55.439 [PXE] [9] 116796 541184 chunk_num=17
2023/07/14 00:35:55.439 [PXE] [4] last chunk_size:3274 decompresslen:14760 tot:5126568
2023/07/14 00:35:55.440 [PXE] [4] read lookup offset:416751063 size:610900
2023/07/14 00:35:55.440 [PXE] [4] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.440 [PXE] [4] search winpeshl.exe 000001E2117FB368
2023/07/14 00:35:55.440 [PXE] [4] find replace file at 000001E2117FB368
2023/07/14 00:35:55.440 [PXE] [4] search hash <b398925bedfcd765a7bff51f10c25d844f462baa>
2023/07/14 00:35:55.440 [PXE] [4] find replace lookup entry_id:7707 raw_size:33280
2023/07/14 00:35:55.440 [PXE] [4] 13272 33280 chunk_num=2
2023/07/14 00:35:55.440 [PXE] [4] last chunk_size:144 decompresslen:512 tot:33280
2023/07/14 00:35:55.440 [PXE] [10] last chunk_size:5394 decompresslen:21088 tot:5132896
2023/07/14 00:35:55.440 [PXE] [10] read lookup offset:335161036 size:583650
2023/07/14 00:35:55.440 [PXE] [4] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.441 [PXE] [9] last chunk_size:1748 decompresslen:16896 tot:541184
2023/07/14 00:35:55.441 [PXE] [9] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.441 [PXE] [11] last chunk_size:4474 decompresslen:16544 tot:5685408
2023/07/14 00:35:55.441 [PXE] [11] read lookup offset:418931091 size:647500
2023/07/14 00:35:55.441 [PXE] [4] jump_exe_len:188416 bin_raw_len:1153776 bin_align_len:1155072
2023/07/14 00:35:55.441 [PXE] [4] windows locate wim finish
2023/07/14 00:35:55.441 [PXE] [4] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.441 [PXE] [4] UDF fill override data ...
2023/07/14 00:35:55.441 [PXE] [4] PdSizeOffset=71872 tagOffset=71680
2023/07/14 00:35:55.441 [PXE] [9] jump_exe_len:188416 bin_raw_len:1661680 bin_align_len:1662976
2023/07/14 00:35:55.441 [PXE] [9] windows locate wim finish
2023/07/14 00:35:55.441 [PXE] [9] Windows virt data new <Windows> ...
2023/07/14 00:35:55.441 [PXE] [4] UDF tag valid OK, should match it.
2023/07/14 00:35:55.441 [PXE] [4] UDF tag refresh OK.
2023/07/14 00:35:55.441 [PXE] [4] ## virt wim file </sources/boot.wim> <417365895> <New:424261632> ...
2023/07/14 00:35:55.441 [PXE] [4] file_entry and extend data in the same block.
2023/07/14 00:35:55.441 [PXE] [9] bootfix.bin data: 80 00 cd 13
2023/07/14 00:35:55.441 [PXE] [9] Auto suppress BIOS cdrom prompt
2023/07/14 00:35:55.441 [PXE] [10] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.441 [PXE] [10] search winpeshl.exe 000001E211DCF418
2023/07/14 00:35:55.441 [PXE] [10] find replace file at 000001E211DCF418
2023/07/14 00:35:55.441 [PXE] [10] search hash <20ff96887a316fcb59c64ef9b477cfe256761c02>
2023/07/14 00:35:55.441 [PXE] [11] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.441 [PXE] [10] find replace lookup entry_id:2393 raw_size:30208
2023/07/14 00:35:55.441 [PXE] [11] search winpeshl.exe 000001E2125051F0
2023/07/14 00:35:55.441 [PXE] [11] find replace file at 000001E2125051F0
2023/07/14 00:35:55.441 [PXE] [11] search hash <6f61a75215e3c22de19bb350c92e3863494acfaa>
2023/07/14 00:35:55.441 [PXE] [4] fix tag override 168[698384 - 698552] 698424 698368 56
2023/07/14 00:35:55.441 [PXE] [11] find replace lookup entry_id:2542 raw_size:32256
2023/07/14 00:35:55.441 [PXE] [9] Auto suppress UEFI cdrom prompt
2023/07/14 00:35:55.441 [PXE] [9] UDF fill override data ...
2023/07/14 00:35:55.441 [PXE] [9] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.441 [PXE] [10] 12730 30208 chunk_num=1
2023/07/14 00:35:55.441 [PXE] [4] find target file, name_len:24, offset: 725864, upadte hash
2023/07/14 00:35:55.442 [PXE] [11] 13208 32256 chunk_num=1
2023/07/14 00:35:55.442 [PXE] [9] UDF tag valid OK, should match it.
2023/07/14 00:35:55.442 [PXE] [9] UDF tag refresh OK.
2023/07/14 00:35:55.442 [PXE] [9] ## virt wim file </sources/boot.wim> <309697521> <New:317353984> ...
2023/07/14 00:35:55.442 [PXE] [9] file_entry and extend data in the same block.
2023/07/14 00:35:55.442 [PXE] [5] last chunk_size:3806 decompresslen:17320 tot:5129128
2023/07/14 00:35:55.442 [PXE] [5] read lookup offset:416517986 size:611600
2023/07/14 00:35:55.442 [PXE] [10] last chunk_size:12730 decompresslen:30208 tot:30208
2023/07/14 00:35:55.442 [PXE] [10] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.442 [PXE] [11] last chunk_size:13208 decompresslen:32256 tot:32256
2023/07/14 00:35:55.442 [PXE] [11] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.442 [PXE] [8] jump_exe_len:188416 bin_raw_len:1152752 bin_align_len:1153024
2023/07/14 00:35:55.442 [PXE] [9] fix tag override 168[765968 - 766136] 766008 765952 56
2023/07/14 00:35:55.442 [PXE] [8] windows locate wim finish
2023/07/14 00:35:55.442 [PXE] [8] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.442 [PXE] [4] find target file, name_len:24, offset: 3350664, upadte hash
2023/07/14 00:35:55.442 [PXE] [8] UDF fill override data ...
2023/07/14 00:35:55.442 [PXE] [8] PdSizeOffset=530624 tagOffset=530432
2023/07/14 00:35:55.442 [PXE] [8] UDF tag valid OK, should match it.
2023/07/14 00:35:55.442 [PXE] [8] UDF tag refresh OK.
2023/07/14 00:35:55.442 [PXE] [8] ## virt wim file </sources/boot.wim> <260639758> <New:266465280> ...
2023/07/14 00:35:55.442 [PXE] [8] file_entry and extend data in the same block.
2023/07/14 00:35:55.442 [PXE] [10] jump_exe_len:188416 bin_raw_len:1150704 bin_align_len:1150976
2023/07/14 00:35:55.442 [PXE] [10] windows locate wim finish
2023/07/14 00:35:55.442 [PXE] [10] Windows virt data new <Windows> ...
2023/07/14 00:35:55.442 [PXE] [11] jump_exe_len:188416 bin_raw_len:1152752 bin_align_len:1153024
2023/07/14 00:35:55.442 [PXE] [11] windows locate wim finish
2023/07/14 00:35:55.442 [PXE] [11] Windows virt data new <Windows> ...
2023/07/14 00:35:55.442 [PXE] [8] fix tag override 224[2162704 - 2162928] 2162744 2162688 56
2023/07/14 00:35:55.442 [PXE] [9] find target file, name_len:24, offset: 863896, upadte hash
2023/07/14 00:35:55.442 [PXE] [10] bootfix.bin data: 80 00 cd 13
2023/07/14 00:35:55.442 [PXE] [10] Auto suppress BIOS cdrom prompt
2023/07/14 00:35:55.442 [PXE] [4] update replace lookup entry_id:7707
2023/07/14 00:35:55.442 [PXE] [4] find meta lookup entry_id:1, update resource head and hash(5126568)
2023/07/14 00:35:55.442 [PXE] [11] bootfix.bin data: 80 00 cd 13
2023/07/14 00:35:55.442 [PXE] [11] Auto suppress BIOS cdrom prompt
2023/07/14 00:35:55.442 [PXE] [4] Virt data ISO file size: 4617338880 5041600512
2023/07/14 00:35:55.442 [PXE] [4] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.442 [PXE] [4] <0> [ 71680 - 72192 512 ]
2023/07/14 00:35:55.442 [PXE] [4] <1> [ 698368 - 698880 512 ]
2023/07/14 00:35:55.442 [PXE] [4] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.442 [PXE] [4] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.442 [PXE] [4] <iso/Windows.10.Pro.19044.2130.iso> WIM:1/1
2023/07/14 00:35:55.442 [PXE] [4] <01> [4617338880 - 5034704896 417366016 ] Remap
2023/07/14 00:35:55.442 [PXE] [10] Auto suppress UEFI cdrom prompt
2023/07/14 00:35:55.442 [PXE] [4] <02> [4617338880 - 4617339088 208 ] Memory
2023/07/14 00:35:55.442 [PXE] [10] UDF fill override data ...
2023/07/14 00:35:55.442 [PXE] [10] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.442 [PXE] [4] <03> [5034704896 - 5035859968 1155072 ] Memory
2023/07/14 00:35:55.442 [PXE] [4] <04> [5034893412 - 5034894436 1024 ] iVentoy Param
2023/07/14 00:35:55.442 [PXE] [4] <05> [5035859968 - 5040988160 5128192 ] Memory
2023/07/14 00:35:55.442 [PXE] [4] <06> [5036585832 - 5036585852 20 ] WIM BIN CHK
2023/07/14 00:35:55.442 [PXE] [4] <07> [5039210632 - 5039210652 20 ] WIM BIN CHK
2023/07/14 00:35:55.442 [PXE] [4] <08> [5040988160 - 5041600512 612352 ] Memory
2023/07/14 00:35:55.442 [PXE] [4] <09> [5041373540 - 5041373560 20 ] WIM BIN CHK
2023/07/14 00:35:55.442 [PXE] [11] Auto suppress UEFI cdrom prompt
2023/07/14 00:35:55.442 [PXE] [4] <10> [5040988240 - 5040988260 20 ] WIM META CHK
2023/07/14 00:35:55.442 [PXE] [11] UDF fill override data ...
2023/07/14 00:35:55.442 [PXE] [9] find target file, name_len:24, offset: 3056944, upadte hash
2023/07/14 00:35:55.442 [PXE] [11] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.442 [PXE] [4] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.442 [PXE] [8] find target file, name_len:24, offset: 592272, upadte hash
2023/07/14 00:35:55.442 [PXE] [4] Phase2 parse image <iso/Windows.10.Pro.19044.2130.iso> finished success
2023/07/14 00:35:55.442 [PXE] [13] Phase2 parse image <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.03.21_English.iso> <UDF> starting...
2023/07/14 00:35:55.442 [PXE] [13] locate wim data (wims:5) ...
2023/07/14 00:35:55.442 [PXE] [10] UDF tag valid OK, should match it.
2023/07/14 00:35:55.442 [PXE] [10] UDF tag refresh OK.
2023/07/14 00:35:55.442 [PXE] [10] ## virt wim file </sources/boot.wim> <335749026> <New:342618112> ...
2023/07/14 00:35:55.442 [PXE] [10] file_entry and extend data in the same block.
2023/07/14 00:35:55.442 [PXE] [11] UDF tag valid OK, should match it.
2023/07/14 00:35:55.443 [PXE] [11] UDF tag refresh OK.
2023/07/14 00:35:55.443 [PXE] [11] ## virt wim file </sources/boot.wim> <419582993> <New:427073536> ...
2023/07/14 00:35:55.443 [PXE] [11] file_entry and extend data in the same block.
2023/07/14 00:35:55.443 [PXE] [8] find target file, name_len:24, offset: 2391136, upadte hash
2023/07/14 00:35:55.443 [PXE] [10] fix tag override 168[802832 - 803000] 802872 802816 56
2023/07/14 00:35:55.443 [PXE] [11] fix tag override 168[763920 - 764088] 763960 763904 56
2023/07/14 00:35:55.443 [PXE] [9] update replace lookup entry_id:1954
2023/07/14 00:35:55.443 [PXE] [9] find meta lookup entry_id:1, update resource head and hash(5322032)
2023/07/14 00:35:55.443 [PXE] [9] Virt data ISO file size: 5973016576 6290370560
2023/07/14 00:35:55.443 [PXE] [9] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE] [9] <0> [ 10219544 - 10219548 4 ]
2023/07/14 00:35:55.443 [PXE] [9] <1> [ 3211264 - 4685824 1474560 ]
2023/07/14 00:35:55.443 [PXE] [9] <2> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.443 [PXE] [9] <3> [ 765952 - 766464 512 ]
2023/07/14 00:35:55.443 [PXE] [9] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE] [9] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE] [9] <iso/windows_server_2012_r2_with_update_9600.20969_aio_16in1_x64.iso> WIM:1/1
2023/07/14 00:35:55.443 [PXE] [9] <01> [5973016576 - 6282715136 309698560 ] Remap
2023/07/14 00:35:55.443 [PXE] [9] <02> [5973016576 - 5973016784 208 ] Memory
2023/07/14 00:35:55.443 [PXE] [9] <03> [6282715136 - 6284378112 1662976 ] Memory
2023/07/14 00:35:55.443 [PXE] [13] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.443 [PXE] [9] <04> [6282903652 - 6282904676 1024 ] iVentoy Param
2023/07/14 00:35:55.443 [PXE] [13] @@ locate wim file </SSTR/strelec11x64Eng.wim> ...
2023/07/14 00:35:55.443 [PXE] [9] <05> [6284378112 - 6289700864 5322752 ] Memory
2023/07/14 00:35:55.443 [PXE] [9] <06> [6285242008 - 6285242028 20 ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE] [9] <07> [6287435056 - 6287435076 20 ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE] [9] <08> [6289700864 - 6290370560 669696 ] Memory
2023/07/14 00:35:55.443 [PXE] [10] find target file, name_len:24, offset: 717848, upadte hash
2023/07/14 00:35:55.443 [PXE] [9] <09> [6289798594 - 6289798614 20 ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE] [9] <10> [6289700944 - 6289700964 20 ] WIM META CHK
2023/07/14 00:35:55.443 [PXE] [9] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE] [9] Phase2 parse image <iso/windows_server_2012_r2_with_update_9600.20969_aio_16in1_x64.iso> finished success
2023/07/14 00:35:55.443 [PXE] [14] Phase2 parse image <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.06.25_English.iso> <UDF> starting...
2023/07/14 00:35:55.443 [PXE] [14] locate wim data (wims:5) ...
2023/07/14 00:35:55.443 [PXE] [11] find target file, name_len:24, offset: 905712, upadte hash
2023/07/14 00:35:55.443 [PXE] [13] @@@ overlen=8 overoff=4012264 fe_entry_size_offset=4012088 start_block=304 file_offset=789868544
2023/07/14 00:35:55.443 [PXE] [10] find target file, name_len:24, offset: 2944920, upadte hash
2023/07/14 00:35:55.443 [PXE] [8] update replace lookup entry_id:2634
2023/07/14 00:35:55.443 [PXE] [8] find meta lookup entry_id:0, update resource head and hash(4239080)
2023/07/14 00:35:55.443 [PXE] [8] Virt data ISO file size: 298205184 564670464
2023/07/14 00:35:55.443 [PXE] [11] find target file, name_len:24, offset: 3346432, upadte hash
2023/07/14 00:35:55.443 [PXE] [8] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE] [8] <0> [ 530432 - 530944 512 ]
2023/07/14 00:35:55.443 [PXE] [8] <1> [ 2162688 - 2163200 512 ]
2023/07/14 00:35:55.443 [PXE] [13] 281980 1059424 chunk_num=33
2023/07/14 00:35:55.443 [PXE] [8] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.443 [PXE] [8] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE] [8] <iso/Windows_Login_Unlocker.iso> WIM:1/1
2023/07/14 00:35:55.443 [PXE] [8] <01> [298205184 - 558845952 260640768 ] Remap
2023/07/14 00:35:55.443 [PXE] [8] <02> [298205184 - 298205392 208 ] Memory
2023/07/14 00:35:55.443 [PXE] [8] <03> [558845952 - 559998976 1153024 ] Memory
2023/07/14 00:35:55.443 [PXE] [8] <04> [559034468 - 559035492 1024 ] iVentoy Param
2023/07/14 00:35:55.443 [PXE] [8] <05> [559998976 - 564238336 4239360 ] Memory
2023/07/14 00:35:55.443 [PXE] [8] <06> [560591248 - 560591268 20 ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE] [8] <07> [562390112 - 562390132 20 ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE] [8] <08> [564238336 - 564670464 432128 ] Memory
2023/07/14 00:35:55.443 [PXE] [8] <09> [564370066 - 564370086 20 ] WIM BIN CHK
2023/07/14 00:35:55.443 [PXE] [8] <10> [564238366 - 564238386 20 ] WIM META CHK
2023/07/14 00:35:55.443 [PXE] [8] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.443 [PXE] [8] Phase2 parse image <iso/Windows_Login_Unlocker.iso> finished success
2023/07/14 00:35:55.443 [PXE] [15] Phase2 parse image <iso/Xemom-Windows_11_PE_x64_En.iso> <UDF> starting...
2023/07/14 00:35:55.443 [PXE] [15] locate wim data (wims:1) ...
2023/07/14 00:35:55.444 [PXE] [10] update replace lookup entry_id:2393
2023/07/14 00:35:55.444 [PXE] [10] find meta lookup entry_id:1, update resource head and hash(5132896)
2023/07/14 00:35:55.444 [PXE] [10] Virt data ISO file size: 4724162560 5066780672
2023/07/14 00:35:55.444 [PXE] [10] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE] [10] <0> [ 9766936 - 9766940 4 ]
2023/07/14 00:35:55.444 [PXE] [10] <1> [ 3465216 - 4939776 1474560 ]
2023/07/14 00:35:55.444 [PXE] [10] <2> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.444 [PXE] [10] <3> [ 802816 - 803328 512 ]
2023/07/14 00:35:55.444 [PXE] [10] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE] [10] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE] [10] <iso/windows_server_2016_with_update_14393.5921_aio_16in1_x64.iso> WIM:1/1
2023/07/14 00:35:55.444 [PXE] [10] <01> [4724162560 - 5059911680 335749120 ] Remap
2023/07/14 00:35:55.444 [PXE] [10] <02> [4724162560 - 4724162768 208 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] update replace lookup entry_id:2542
2023/07/14 00:35:55.444 [PXE] [10] <03> [5059911680 - 5061062656 1150976 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] find meta lookup entry_id:1, update resource head and hash(5685408)
2023/07/14 00:35:55.444 [PXE] [10] <04> [5060100196 - 5060101220 1024 ] iVentoy Param
2023/07/14 00:35:55.444 [PXE] [10] <05> [5061062656 - 5066196992 5134336 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] Virt data ISO file size: 4810375168 5237448704
2023/07/14 00:35:55.444 [PXE] [10] <06> [5061780504 - 5061780524 20 ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE] [11] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE] [10] <07> [5064007576 - 5064007596 20 ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE] [11] <0> [ 9840664 - 9840668 4 ]
2023/07/14 00:35:55.444 [PXE] [10] <08> [5066196992 - 5066780672 583680 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] <1> [ 3229696 - 4704256 1474560 ]
2023/07/14 00:35:55.444 [PXE] [10] <09> [5066316672 - 5066316692 20 ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE] [11] <2> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.444 [PXE] [11] <3> [ 763904 - 764416 512 ]
2023/07/14 00:35:55.444 [PXE] [10] <10> [5066197072 - 5066197092 20 ] WIM META CHK
2023/07/14 00:35:55.444 [PXE] [11] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.444 [PXE] [10] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE] [11] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE] [10] Phase2 parse image <iso/windows_server_2016_with_update_14393.5921_aio_16in1_x64.iso> finished success
2023/07/14 00:35:55.444 [PXE] [11] <iso/windows_server_2019_with_update_17763.4377_aio_12in1_x64.iso> WIM:1/1
2023/07/14 00:35:55.444 [PXE] [11] <01> [4810375168 - 5229959168 419584000 ] Remap
2023/07/14 00:35:55.444 [PXE] [11] <02> [4810375168 - 4810375376 208 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] <03> [5229959168 - 5231112192 1153024 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] <04> [5230147684 - 5230148708 1024 ] iVentoy Param
2023/07/14 00:35:55.444 [PXE] [11] <05> [5231112192 - 5236799488 5687296 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] <06> [5232017904 - 5232017924 20 ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE] [5] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.444 [PXE] [11] <07> [5234458624 - 5234458644 20 ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE] [11] <08> [5236799488 - 5237448704 649216 ] Memory
2023/07/14 00:35:55.444 [PXE] [11] <09> [5236926618 - 5236926638 20 ] WIM BIN CHK
2023/07/14 00:35:55.444 [PXE] [11] <10> [5236799568 - 5236799588 20 ] WIM META CHK
2023/07/14 00:35:55.444 [PXE] [5] search winpeshl.exe 000001E21057CD68
2023/07/14 00:35:55.444 [PXE] [11] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.444 [PXE] [5] find replace file at 000001E21057CD68
2023/07/14 00:35:55.444 [PXE] [11] Phase2 parse image <iso/windows_server_2019_with_update_17763.4377_aio_12in1_x64.iso> finished success
2023/07/14 00:35:55.444 [PXE] [5] search hash <b398925bedfcd765a7bff51f10c25d844f462baa>
2023/07/14 00:35:55.444 [PXE] [5] find replace lookup entry_id:7707 raw_size:33280
2023/07/14 00:35:55.444 [PXE] [15] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.444 [PXE] [15] @@ locate wim file </sources/boot.wim> ...
2023/07/14 00:35:55.444 [PXE] [5] 13272 33280 chunk_num=2
2023/07/14 00:35:55.444 [PXE] [14] ExtraBuf totlen:932012 tool:930820 autonum:0 injectlen:0
2023/07/14 00:35:55.444 [PXE] [14] @@ locate wim file </SSTR/strelec11x64Eng.wim> ...
2023/07/14 00:35:55.444 [PXE] [5] last chunk_size:144 decompresslen:512 tot:33280
2023/07/14 00:35:55.444 [PXE] [5] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.444 [PXE] [15] @@@ overlen=8 overoff=590000 fe_entry_size_offset=589880 start_block=266 file_offset=9871360
2023/07/14 00:35:55.444 [PXE] [14] @@@ overlen=8 overoff=4014312 fe_entry_size_offset=4014136 start_block=304 file_offset=771942400
2023/07/14 00:35:55.445 [PXE] [15] 132800 486336 chunk_num=15
2023/07/14 00:35:55.445 [PXE] [14] 292834 1112816 chunk_num=34
2023/07/14 00:35:55.445 [PXE] [5] jump_exe_len:188416 bin_raw_len:1153776 bin_align_len:1155072
2023/07/14 00:35:55.445 [PXE] [5] windows locate wim finish
2023/07/14 00:35:55.445 [PXE] [5] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.445 [PXE] [5] UDF fill override data ...
2023/07/14 00:35:55.445 [PXE] [5] PdSizeOffset=71872 tagOffset=71680
2023/07/14 00:35:55.445 [PXE] [5] UDF tag valid OK, should match it.
2023/07/14 00:35:55.445 [PXE] [5] UDF tag refresh OK.
2023/07/14 00:35:55.445 [PXE] [5] ## virt wim file </sources/boot.wim> <417133518> <New:424032256> ...
2023/07/14 00:35:55.445 [PXE] [5] file_entry and extend data in the same block.
2023/07/14 00:35:55.445 [PXE] [5] fix tag override 168[698384 - 698552] 698424 698368 56
2023/07/14 00:35:55.445 [PXE] [5] find target file, name_len:24, offset: 728424, upadte hash
2023/07/14 00:35:55.446 [PXE] [13] last chunk_size:2800 decompresslen:10848 tot:1059424
2023/07/14 00:35:55.446 [PXE] [13] read lookup offset:480525387 size:262450
2023/07/14 00:35:55.446 [PXE] [13] search pecmd.exe 000001E213A7F5A0
2023/07/14 00:35:55.446 [PXE] [13] search reg SYSTEM 000001E213AD31C8
2023/07/14 00:35:55.446 [PXE] [13] find system lookup entry_id:3097 raw_size:7602176
2023/07/14 00:35:55.446 [PXE] [5] find target file, name_len:24, offset: 3353224, upadte hash
2023/07/14 00:35:55.447 [PXE] [5] update replace lookup entry_id:7707
2023/07/14 00:35:55.447 [PXE] [5] find meta lookup entry_id:1, update resource head and hash(5129128)
2023/07/14 00:35:55.447 [PXE] [5] Virt data ISO file size: 4385144832 4809177088
2023/07/14 00:35:55.447 [PXE] [5] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.447 [PXE] [5] <0> [ 71680 - 72192 512 ]
2023/07/14 00:35:55.447 [PXE] [5] <1> [ 698368 - 698880 512 ]
2023/07/14 00:35:55.447 [PXE] [5] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.447 [PXE] [5] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.447 [PXE] [5] <iso/Windows.11.Pro.22621.674.iso> WIM:1/1
2023/07/14 00:35:55.447 [PXE] [5] <01> [4385144832 - 4802279424 417134592 ] Remap
2023/07/14 00:35:55.447 [PXE] [5] <02> [4385144832 - 4385145040 208 ] Memory
2023/07/14 00:35:55.447 [PXE] [5] <03> [4802279424 - 4803434496 1155072 ] Memory
2023/07/14 00:35:55.447 [PXE] [5] <04> [4802467940 - 4802468964 1024 ] iVentoy Param
2023/07/14 00:35:55.447 [PXE] [5] <05> [4803434496 - 4808564736 5130240 ] Memory
2023/07/14 00:35:55.447 [PXE] [5] <06> [4804162920 - 4804162940 20 ] WIM BIN CHK
2023/07/14 00:35:55.447 [PXE] [13] 1252840 7602176 chunk_num=232
2023/07/14 00:35:55.447 [PXE] [5] <07> [4806787720 - 4806787740 20 ] WIM BIN CHK
2023/07/14 00:35:55.447 [PXE] [5] <08> [4808564736 - 4809177088 612352 ] Memory
2023/07/14 00:35:55.447 [PXE] [5] <09> [4808950116 - 4808950136 20 ] WIM BIN CHK
2023/07/14 00:35:55.447 [PXE] [5] <10> [4808564816 - 4808564836 20 ] WIM META CHK
2023/07/14 00:35:55.447 [PXE] [5] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.447 [PXE] [5] Phase2 parse image <iso/Windows.11.Pro.22621.674.iso> finished success
2023/07/14 00:35:55.447 [PXE] [15] last chunk_size:6370 decompresslen:27584 tot:486336
2023/07/14 00:35:55.447 [PXE] [15] read lookup offset:264422723 size:112250
2023/07/14 00:35:55.448 [PXE] [15] search pecmd.exe 000001E20A0811E8
2023/07/14 00:35:55.448 [PXE] [15] search reg SYSTEM 000001E20A0924C8
2023/07/14 00:35:55.448 [PXE] [15] find system lookup entry_id:1129 raw_size:6516736
2023/07/14 00:35:55.448 [PXE] [14] last chunk_size:8156 decompresslen:31472 tot:1112816
2023/07/14 00:35:55.448 [PXE] [14] read lookup offset:473604785 size:274150
2023/07/14 00:35:55.448 [PXE] [14] search pecmd.exe 000001E213CFFDD0
2023/07/14 00:35:55.448 [PXE] [14] search reg SYSTEM 000001E213D5ACD8
2023/07/14 00:35:55.448 [PXE] [14] find system lookup entry_id:3256 raw_size:7471104
2023/07/14 00:35:55.448 [PXE] [15] 987852 6516736 chunk_num=199
2023/07/14 00:35:55.449 [PXE] [14] 1155746 7471104 chunk_num=228
2023/07/14 00:35:55.450 [PXE] [12] last chunk_size:78 decompresslen:32768 tot:8126464
2023/07/14 00:35:55.450 [PXE] [12] find registry cmdline i:1431632 offset:(0x15c870)1427568 size:(0x66)102
2023/07/14 00:35:55.450 [PXE] [12] start offset is 0x15d874(1431668)
2023/07/14 00:35:55.451 [PXE] [12] registry setup cmdline:<Pecmd.exe Main %Windir%\System32\serversharing.dll>
2023/07/14 00:35:55.451 [PXE] [12] @ directly use pecmd.exe 000001E212B2D668
2023/07/14 00:35:55.451 [PXE] [12] find replace file at 000001E212B2D668
2023/07/14 00:35:55.451 [PXE] [12] search hash <0f1a5b9e812b436a11573da7c040c87a9e1e0457>
2023/07/14 00:35:55.451 [PXE] [12] find replace lookup entry_id:4195 raw_size:1047040
2023/07/14 00:35:55.452 [PXE] [12] 867182 1047040 chunk_num=32
2023/07/14 00:35:55.455 [PXE] [12] last chunk_size:28492 decompresslen:31232 tot:1047040
2023/07/14 00:35:55.455 [PXE] [12] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.456 [PXE] [12] jump_exe_len:188416 bin_raw_len:2167536 bin_align_len:2168832
2023/07/14 00:35:55.456 [PXE] [12] @@ locate wim file </ktv/10ktv86.wim> ...
2023/07/14 00:35:55.456 [PXE] [12] @@@ overlen=8 overoff=737456 fe_entry_size_offset=737336 start_block=257 file_offset=982081536
2023/07/14 00:35:55.457 [PXE] [12] 167076 682160 chunk_num=21
2023/07/14 00:35:55.459 [PXE] [12] last chunk_size:5358 decompresslen:26800 tot:682160
2023/07/14 00:35:55.459 [PXE] [12] read lookup offset:208637644 size:168000
2023/07/14 00:35:55.459 [PXE] [12] search pecmd.exe 000001E21564BB28
2023/07/14 00:35:55.459 [PXE] [12] search reg SYSTEM 000001E2156676C8
2023/07/14 00:35:55.459 [PXE] [12] find system lookup entry_id:2323 raw_size:6029312
2023/07/14 00:35:55.460 [PXE] [12] 868502 6029312 chunk_num=184
2023/07/14 00:35:55.464 [PXE] [13] last chunk_size:78 decompresslen:32768 tot:7602176
2023/07/14 00:35:55.464 [PXE] [15] last chunk_size:6490 decompresslen:28672 tot:6516736
2023/07/14 00:35:55.466 [PXE] [15] find registry cmdline i:6508416 offset:(0x634020)6504480 size:(0x56)86
2023/07/14 00:35:55.466 [PXE] [15] start offset is 0x635024(6508580)
2023/07/14 00:35:55.466 [PXE] [13] find registry cmdline i:7352216 offset:(0x702020)7348256 size:(0x5e)94
2023/07/14 00:35:55.466 [PXE] [13] start offset is 0x703024(7352356)
2023/07/14 00:35:55.467 [PXE] [13] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.467 [PXE] [13] @ directly use pecmd.exe 000001E213A7F5A0
2023/07/14 00:35:55.467 [PXE] [13] find replace file at 000001E213A7F5A0
2023/07/14 00:35:55.467 [PXE] [15] registry setup cmdline:<pecmd.exe main %windir%\System32\pecmd.ini>
2023/07/14 00:35:55.467 [PXE] [15] @ directly use pecmd.exe 000001E20A0811E8
2023/07/14 00:35:55.467 [PXE] [15] find replace file at 000001E20A0811E8
2023/07/14 00:35:55.467 [PXE] [13] search hash <f7c447f2997dd329b62ad02756f55871cac1ad2d>
2023/07/14 00:35:55.467 [PXE] [13] find replace lookup entry_id:1564 raw_size:1452544
2023/07/14 00:35:55.467 [PXE] [15] search hash <0c744efec7418fc706aa3c7e2e3c102538375363>
2023/07/14 00:35:55.467 [PXE] [15] find replace lookup entry_id:552 raw_size:894976
2023/07/14 00:35:55.467 [PXE] [14] last chunk_size:7516 decompresslen:32768 tot:7471104
2023/07/14 00:35:55.468 [PXE] [15] 861594 894976 chunk_num=28
2023/07/14 00:35:55.468 [PXE] [13] 804250 1452544 chunk_num=45
2023/07/14 00:35:55.470 [PXE] [14] find registry cmdline i:7462040 offset:(0x71ccb8)7457976 size:(0x5e)94
2023/07/14 00:35:55.470 [PXE] [14] start offset is 0x71dcbc(7462076)
2023/07/14 00:35:55.470 [PXE] [15] last chunk_size:8584 decompresslen:10240 tot:894976
2023/07/14 00:35:55.470 [PXE] [15] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.470 [PXE] [14] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.470 [PXE] [14] @ directly use pecmd.exe 000001E213CFFDD0
2023/07/14 00:35:55.470 [PXE] [14] find replace file at 000001E213CFFDD0
2023/07/14 00:35:55.470 [PXE] [14] search hash <f75689748b78db45cd4a39455b2734eb8780974c>
2023/07/14 00:35:55.470 [PXE] [14] find replace lookup entry_id:1613 raw_size:1453056
2023/07/14 00:35:55.471 [PXE] [15] jump_exe_len:188416 bin_raw_len:2015472 bin_align_len:2017280
2023/07/14 00:35:55.471 [PXE] [15] windows locate wim finish
2023/07/14 00:35:55.471 [PXE] [15] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.471 [PXE] [15] UDF fill override data ...
2023/07/14 00:35:55.471 [PXE] [15] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.471 [PXE] [15] UDF tag valid OK, should match it.
2023/07/14 00:35:55.471 [PXE] [14] 804374 1453056 chunk_num=45
2023/07/14 00:35:55.471 [PXE] [15] UDF tag refresh OK.
2023/07/14 00:35:55.471 [PXE] [15] ## virt wim file </sources/boot.wim> <264536951> <New:267155456> ...
2023/07/14 00:35:55.471 [PXE] [15] file_entry and extend data in the same block.
2023/07/14 00:35:55.471 [PXE] [15] fix tag override 168[589840 - 590008] 589880 589824 56
2023/07/14 00:35:55.471 [PXE] [15] find target file, name_len:18, offset: 151816, upadte hash
2023/07/14 00:35:55.471 [PXE] [15] update replace lookup entry_id:552
2023/07/14 00:35:55.471 [PXE] [15] find meta lookup entry_id:0, update resource head and hash(486336)
2023/07/14 00:35:55.471 [PXE] [15] Virt data ISO file size: 274432000 541587456
2023/07/14 00:35:55.471 [PXE] [15] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.471 [PXE] [15] <0> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.471 [PXE] [15] <1> [ 589824 - 590336 512 ]
2023/07/14 00:35:55.472 [PXE] [15] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.472 [PXE] [15] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.472 [PXE] [15] <iso/Xemom-Windows_11_PE_x64_En.iso> WIM:1/1
2023/07/14 00:35:55.472 [PXE] [15] <01> [274432000 - 538970112 264538112 ] Remap
2023/07/14 00:35:55.472 [PXE] [15] <02> [274432000 - 274432208 208 ] Memory
2023/07/14 00:35:55.472 [PXE] [15] <03> [538970112 - 540987392 2017280 ] Memory
2023/07/14 00:35:55.472 [PXE] [15] <04> [539158628 - 539159652 1024 ] iVentoy Param
2023/07/14 00:35:55.472 [PXE] [15] <05> [540987392 - 541474816 487424 ] Memory
2023/07/14 00:35:55.472 [PXE] [15] <06> [541139208 - 541139228 20 ] WIM BIN CHK
2023/07/14 00:35:55.472 [PXE] [15] <07> [541474816 - 541587456 112640 ] Memory
2023/07/14 00:35:55.472 [PXE] [15] <08> [541502446 - 541502466 20 ] WIM BIN CHK
2023/07/14 00:35:55.472 [PXE] [15] <09> [541474846 - 541474866 20 ] WIM META CHK
2023/07/14 00:35:55.472 [PXE] [15] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.472 [PXE] [15] Phase2 parse image <iso/Xemom-Windows_11_PE_x64_En.iso> finished success
2023/07/14 00:35:55.472 [PXE] [12] last chunk_size:78 decompresslen:32768 tot:6029312
2023/07/14 00:35:55.473 [PXE] [12] find registry cmdline i:246616 offset:(0x46e640)4646464 size:(0x66)102
2023/07/14 00:35:55.473 [PXE] [12] start offset is 0x46f644(4650564)
2023/07/14 00:35:55.473 [PXE] [12] registry setup cmdline:<Pecmd.exe Main %Windir%\System32\networkshared.dll>
2023/07/14 00:35:55.473 [PXE] [12] @ directly use pecmd.exe 000001E21564BB28
2023/07/14 00:35:55.473 [PXE] [12] find replace file at 000001E21564BB28
2023/07/14 00:35:55.473 [PXE] [12] search hash <e0a44711085e63c93f57f691f6115c7588fffbde>
2023/07/14 00:35:55.473 [PXE] [12] find replace lookup entry_id:2397 raw_size:822272
2023/07/14 00:35:55.474 [PXE] [12] 736832 822272 chunk_num=26
2023/07/14 00:35:55.475 [PXE] [13] last chunk_size:3068 decompresslen:10752 tot:1452544
2023/07/14 00:35:55.475 [PXE] [13] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.476 [PXE] [12] last chunk_size:1956 decompresslen:3072 tot:822272
2023/07/14 00:35:55.476 [PXE] [12] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.476 [PXE] [13] jump_exe_len:188416 bin_raw_len:2573040 bin_align_len:2574336
2023/07/14 00:35:55.476 [PXE] [13] @@ locate wim file </SSTR/strelec10x64Eng.wim> ...
2023/07/14 00:35:55.476 [PXE] [13] @@@ overlen=8 overoff=4010216 fe_entry_size_offset=4010040 start_block=304 file_offset=324292608
2023/07/14 00:35:55.477 [PXE] [12] jump_exe_len:155648 bin_raw_len:1910000 bin_align_len:1910784
2023/07/14 00:35:55.477 [PXE] [13] 280062 1048480 chunk_num=32
2023/07/14 00:35:55.477 [PXE] [12] windows locate wim finish
2023/07/14 00:35:55.477 [PXE] [12] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.477 [PXE] [12] UDF fill override data ...
2023/07/14 00:35:55.477 [PXE] [12] PdSizeOffset=69824 tagOffset=69632
2023/07/14 00:35:55.477 [PXE] [12] UDF tag valid OK, should match it.
2023/07/14 00:35:55.477 [PXE] [12] UDF tag refresh OK.
2023/07/14 00:35:55.477 [PXE] [12] ## virt wim file </ktv/10ktv64.wim> <418382741> <New:422123520> ...
2023/07/14 00:35:55.477 [PXE] [12] file_entry and extend data in the same block.
2023/07/14 00:35:55.477 [PXE] [12] fix tag override 168[735248 - 735416] 735288 735232 56
2023/07/14 00:35:55.477 [PXE] [12] ## virt wim file </ktv/10ktv86.wim> <208807614> <New:211572736> ...
2023/07/14 00:35:55.477 [PXE] [12] file_entry and extend data in the same block.
2023/07/14 00:35:55.478 [PXE] [12] fix tag override 168[737296 - 737464] 737336 737280 56
2023/07/14 00:35:55.478 [PXE] [12] find target file, name_len:18, offset: 558696, upadte hash
2023/07/14 00:35:55.478 [PXE] [12] update replace lookup entry_id:4195
2023/07/14 00:35:55.478 [PXE] [12] find meta lookup entry_id:0, update resource head and hash(1309216)
2023/07/14 00:35:55.478 [PXE] [12] find target file, name_len:18, offset: 178920, upadte hash
2023/07/14 00:35:55.478 [PXE] [12] update replace lookup entry_id:2397
2023/07/14 00:35:55.478 [PXE] [12] find meta lookup entry_id:0, update resource head and hash(682160)
2023/07/14 00:35:55.478 [PXE] [12] Virt data ISO file size: 2370863104 3004559360
2023/07/14 00:35:55.478 [PXE] [12] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.478 [PXE] [12] <0> [ 69632 - 70144 512 ]
2023/07/14 00:35:55.478 [PXE] [12] <1> [ 735232 - 735744 512 ]
2023/07/14 00:35:55.478 [PXE] [12] <2> [ 737280 - 737792 512 ]
2023/07/14 00:35:55.478 [PXE] [12] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.478 [PXE] [12] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.478 [PXE] [12] <iso/WinPE10Ktv-v5.3-Autumn-Free-2022.ISO> WIM:2/2
2023/07/14 00:35:55.478 [PXE] [12] <01> [2370863104 - 2789246976 418383872 ] Remap
2023/07/14 00:35:55.478 [PXE] [12] <02> [2370863104 - 2370863312 208 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <03> [2789246976 - 2791415808 2168832 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <04> [2789435492 - 2789436516 1024 ] iVentoy Param
2023/07/14 00:35:55.478 [PXE] [12] <05> [2791415808 - 2792726528 1310720 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <06> [2791974504 - 2791974524 20 ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE] [12] <07> [2792726528 - 2792986624 260096 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <08> [2792936308 - 2792936328 20 ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE] [12] <09> [2792726558 - 2792726578 20 ] WIM META CHK
2023/07/14 00:35:55.478 [PXE] [12] <10> [2792986624 - 3001794560 208807936 ] Remap
2023/07/14 00:35:55.478 [PXE] [12] <11> [2792986624 - 2792986832 208 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <12> [3001794560 - 3003705344 1910784 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <13> [3001950308 - 3001951332 1024 ] iVentoy Param
2023/07/14 00:35:55.478 [PXE] [12] <14> [3003705344 - 3004389376 684032 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <15> [3003884264 - 3003884284 20 ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE] [12] <16> [3004389376 - 3004559360 169984 ] Memory
2023/07/14 00:35:55.478 [PXE] [12] <17> [3004509256 - 3004509276 20 ] WIM BIN CHK
2023/07/14 00:35:55.478 [PXE] [12] <18> [3004389406 - 3004389426 20 ] WIM META CHK
2023/07/14 00:35:55.478 [PXE] [12] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.478 [PXE] [12] Phase2 parse image <iso/WinPE10Ktv-v5.3-Autumn-Free-2022.ISO> finished success
2023/07/14 00:35:55.478 [PXE] [14] last chunk_size:3188 decompresslen:11264 tot:1453056
2023/07/14 00:35:55.478 [PXE] [14] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.479 [PXE] [14] jump_exe_len:188416 bin_raw_len:2573552 bin_align_len:2574336
2023/07/14 00:35:55.479 [PXE] [14] @@ locate wim file </SSTR/strelec10x64Eng.wim> ...
2023/07/14 00:35:55.479 [PXE] [14] @@@ overlen=8 overoff=4012264 fe_entry_size_offset=4012088 start_block=304 file_offset=317902848
2023/07/14 00:35:55.479 [PXE] [13] last chunk_size:8120 decompresslen:32672 tot:1048480
2023/07/14 00:35:55.479 [PXE] [13] read lookup offset:465305468 size:266950
2023/07/14 00:35:55.479 [PXE] [14] 281762 1050704 chunk_num=33
2023/07/14 00:35:55.480 [PXE] [13] search pecmd.exe 000001E213075AB0
2023/07/14 00:35:55.480 [PXE] [13] search reg SYSTEM 000001E2130BB1B0
2023/07/14 00:35:55.480 [PXE] [13] find system lookup entry_id:2928 raw_size:7864320
2023/07/14 00:35:55.480 [PXE] [13] 1142840 7864320 chunk_num=240
2023/07/14 00:35:55.482 [PXE] [14] last chunk_size:810 decompresslen:2128 tot:1050704
2023/07/14 00:35:55.482 [PXE] [14] read lookup offset:453769671 size:267550
2023/07/14 00:35:55.482 [PXE] [14] search pecmd.exe 000001E212C6F9D8
2023/07/14 00:35:55.482 [PXE] [14] search reg SYSTEM 000001E212CB5198
2023/07/14 00:35:55.482 [PXE] [14] find system lookup entry_id:2931 raw_size:7626752
2023/07/14 00:35:55.483 [PXE] [14] 1141418 7626752 chunk_num=233
2023/07/14 00:35:55.494 [PXE] [13] last chunk_size:78 decompresslen:32768 tot:7864320
2023/07/14 00:35:55.496 [PXE] [13] find registry cmdline i:7614624 offset:(0x7420c0)7610560 size:(0x5e)94
2023/07/14 00:35:55.496 [PXE] [13] start offset is 0x7430c4(7614660)
2023/07/14 00:35:55.496 [PXE] [13] registry setup cmdline:<Pecmd.exe Main %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.496 [PXE] [13] @ directly use pecmd.exe 000001E213075AB0
2023/07/14 00:35:55.496 [PXE] [13] find replace file at 000001E213075AB0
2023/07/14 00:35:55.496 [PXE] [13] search hash <f7c447f2997dd329b62ad02756f55871cac1ad2d>
2023/07/14 00:35:55.496 [PXE] [13] find replace lookup entry_id:1596 raw_size:1452544
2023/07/14 00:35:55.497 [PXE] [13] 804250 1452544 chunk_num=45
2023/07/14 00:35:55.497 [PXE] [14] last chunk_size:5636 decompresslen:24576 tot:7626752
2023/07/14 00:35:55.499 [PXE] [14] find registry cmdline i:7617984 offset:(0x742de0)7613920 size:(0x5e)94
2023/07/14 00:35:55.499 [PXE] [14] start offset is 0x743de4(7618020)
2023/07/14 00:35:55.504 [PXE] [13] last chunk_size:3068 decompresslen:10752 tot:1452544
2023/07/14 00:35:55.504 [PXE] [13] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.516 [PXE] [14] registry setup cmdline:<Pecmd.exe Main %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.516 [PXE] [14] @ directly use pecmd.exe 000001E212C6F9D8
2023/07/14 00:35:55.516 [PXE] [14] find replace file at 000001E212C6F9D8
2023/07/14 00:35:55.516 [PXE] [14] search hash <f75689748b78db45cd4a39455b2734eb8780974c>
2023/07/14 00:35:55.516 [PXE] [14] find replace lookup entry_id:1596 raw_size:1453056
2023/07/14 00:35:55.516 [PXE] [13] jump_exe_len:188416 bin_raw_len:2573040 bin_align_len:2574336
2023/07/14 00:35:55.516 [PXE] [13] @@ locate wim file </SSTR/strelec8Eng.wim> ...
2023/07/14 00:35:55.517 [PXE] [13] @@@ overlen=8 overoff=4014312 fe_entry_size_offset=4014136 start_block=304 file_offset=1270659072
2023/07/14 00:35:55.517 [PXE] [14] 804374 1453056 chunk_num=45
2023/07/14 00:35:55.517 [PXE] [13] 212290 863040 chunk_num=27
2023/07/14 00:35:55.519 [PXE] [13] last chunk_size:2590 decompresslen:11072 tot:863040
2023/07/14 00:35:55.519 [PXE] [13] read lookup offset:254133947 size:217750
2023/07/14 00:35:55.520 [PXE] [13] search pecmd.exe 000001E213E6A4C0
2023/07/14 00:35:55.520 [PXE] [13] search reg SYSTEM 000001E213E99428
2023/07/14 00:35:55.520 [PXE] [13] find system lookup entry_id:4349 raw_size:4194304
2023/07/14 00:35:55.520 [PXE] [13] 637878 4194304 chunk_num=128
2023/07/14 00:35:55.523 [PXE] [14] last chunk_size:3188 decompresslen:11264 tot:1453056
2023/07/14 00:35:55.523 [PXE] [14] jump exe </win/vtoypxe64.exe> len:188416 alignlen:188416
2023/07/14 00:35:55.524 [PXE] [14] jump_exe_len:188416 bin_raw_len:2573552 bin_align_len:2574336
2023/07/14 00:35:55.524 [PXE] [14] @@ locate wim file </SSTR/strelec8Eng.wim> ...
2023/07/14 00:35:55.524 [PXE] [14] @@@ overlen=8 overoff=4016360 fe_entry_size_offset=4016184 start_block=304 file_offset=1245825024
2023/07/14 00:35:55.525 [PXE] [14] 212108 860592 chunk_num=27
2023/07/14 00:35:55.526 [PXE] [14] last chunk_size:2108 decompresslen:8624 tot:860592
2023/07/14 00:35:55.526 [PXE] [14] read lookup offset:248154096 size:217350
2023/07/14 00:35:55.526 [PXE] [14] search pecmd.exe 000001E213F80EA8
2023/07/14 00:35:55.527 [PXE] [14] search reg SYSTEM 000001E213FAFF10
2023/07/14 00:35:55.527 [PXE] [14] find system lookup entry_id:4340 raw_size:4124672
2023/07/14 00:35:55.527 [PXE] [14] 644574 4124672 chunk_num=126
2023/07/14 00:35:55.528 [PXE] [13] last chunk_size:78 decompresslen:32768 tot:4194304
2023/07/14 00:35:55.528 [PXE] [13] find registry cmdline i:237480 offset:(0x38fc8)233416 size:(0x56)86
2023/07/14 00:35:55.528 [PXE] [13] start offset is 0x39fcc(237516)
2023/07/14 00:35:55.529 [PXE] [13] registry setup cmdline:<PECMD.EXE MAIN %WinDir%\system32\PECMD.INI>
2023/07/14 00:35:55.529 [PXE] [13] @ directly use pecmd.exe 000001E213E6A4C0
2023/07/14 00:35:55.529 [PXE] [13] find replace file at 000001E213E6A4C0
2023/07/14 00:35:55.529 [PXE] [13] search hash <5ffc19ca0ba44aa2c44b31c0c2d7d36270c58fbd>
2023/07/14 00:35:55.529 [PXE] [13] find replace lookup entry_id:1781 raw_size:1084928
2023/07/14 00:35:55.529 [PXE] [13] 668374 1084928 chunk_num=34
2023/07/14 00:35:55.534 [PXE] [13] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.534 [PXE] [13] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.535 [PXE] [13] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.535 [PXE] [13] @@ locate wim file </SSTR/strelec10Eng.wim> ...
2023/07/14 00:35:55.535 [PXE] [14] last chunk_size:6314 decompresslen:28672 tot:4124672
2023/07/14 00:35:55.536 [PXE] [13] @@@ overlen=8 overoff=4008168 fe_entry_size_offset=4007992 start_block=304 file_offset=11925504
2023/07/14 00:35:55.536 [PXE] [13] 285718 1155424 chunk_num=36
2023/07/14 00:35:55.536 [PXE] [14] find registry cmdline i:4117088 offset:(0x3ec280)4113024 size:(0x56)86
2023/07/14 00:35:55.537 [PXE] [14] start offset is 0x3ed284(4117124)
2023/07/14 00:35:55.537 [PXE] [14] registry setup cmdline:<PECMD.EXE MAIN %WinDir%\system32\PECMD.INI>
2023/07/14 00:35:55.537 [PXE] [14] @ directly use pecmd.exe 000001E213F80EA8
2023/07/14 00:35:55.537 [PXE] [14] find replace file at 000001E213F80EA8
2023/07/14 00:35:55.537 [PXE] [14] search hash <dfee9ace54bae8964d7243ee5b3e388a22fbc7be>
2023/07/14 00:35:55.537 [PXE] [14] find replace lookup entry_id:1776 raw_size:1084928
2023/07/14 00:35:55.537 [PXE] [14] 668508 1084928 chunk_num=34
2023/07/14 00:35:55.538 [PXE] [13] last chunk_size:2316 decompresslen:8544 tot:1155424
2023/07/14 00:35:55.538 [PXE] [13] read lookup offset:312098248 size:265500
2023/07/14 00:35:55.539 [PXE] [13] search pecmd.exe 000001E214A08278
2023/07/14 00:35:55.539 [PXE] [13] search reg SYSTEM 000001E214A60290
2023/07/14 00:35:55.539 [PXE] [13] find system lookup entry_id:3249 raw_size:5767168
2023/07/14 00:35:55.539 [PXE] [13] 865670 5767168 chunk_num=176
2023/07/14 00:35:55.542 [PXE] [14] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.542 [PXE] [14] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.542 [PXE] [14] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.542 [PXE] [14] @@ locate wim file </SSTR/strelec10Eng.wim> ...
2023/07/14 00:35:55.543 [PXE] [14] @@@ overlen=8 overoff=4010216 fe_entry_size_offset=4010040 start_block=304 file_offset=11986944
2023/07/14 00:35:55.543 [PXE] [14] 284724 1151384 chunk_num=36
2023/07/14 00:35:55.546 [PXE] [14] last chunk_size:1352 decompresslen:4504 tot:1151384
2023/07/14 00:35:55.546 [PXE] [14] read lookup offset:305648208 size:265050
2023/07/14 00:35:55.546 [PXE] [14] search pecmd.exe 000001E214DE6CB0
2023/07/14 00:35:55.546 [PXE] [14] search reg SYSTEM 000001E214E3ECD8
2023/07/14 00:35:55.546 [PXE] [14] find system lookup entry_id:3247 raw_size:5742592
2023/07/14 00:35:55.547 [PXE] [14] 870464 5742592 chunk_num=176
2023/07/14 00:35:55.550 [PXE] [13] last chunk_size:2182 decompresslen:32768 tot:5767168
2023/07/14 00:35:55.550 [PXE] [13] find registry cmdline i:278184 offset:(0x43178)274808 size:(0x5e)94
2023/07/14 00:35:55.550 [PXE] [13] start offset is 0x4417c(278908)
2023/07/14 00:35:55.551 [PXE] [13] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.551 [PXE] [13] @ directly use pecmd.exe 000001E214A08278
2023/07/14 00:35:55.551 [PXE] [13] find replace file at 000001E214A08278
2023/07/14 00:35:55.551 [PXE] [13] search hash <5ffc19ca0ba44aa2c44b31c0c2d7d36270c58fbd>
2023/07/14 00:35:55.551 [PXE] [13] find replace lookup entry_id:1717 raw_size:1084928
2023/07/14 00:35:55.552 [PXE] [13] 668374 1084928 chunk_num=34
2023/07/14 00:35:55.556 [PXE] [13] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.556 [PXE] [13] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.557 [PXE] [13] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.557 [PXE] [13] @@ locate wim file </SSTR/strelec8NEEng.wim> ...
2023/07/14 00:35:55.557 [PXE] [13] @@@ overlen=8 overoff=4016360 fe_entry_size_offset=4016184 start_block=304 file_offset=1525016576
2023/07/14 00:35:55.557 [PXE] [13] 10760 36184 chunk_num=2
2023/07/14 00:35:55.557 [PXE] [13] last chunk_size:1036 decompresslen:3416 tot:36184
2023/07/14 00:35:55.557 [PXE] [13] read lookup offset:17893577 size:10450
2023/07/14 00:35:55.558 [PXE] [13] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.558 [PXE] [13] search winpeshl.exe 0000000000000000
2023/07/14 00:35:55.558 [PXE] [13] Failed to find replace file 0000000000000000
2023/07/14 00:35:55.558 [PXE] [13] windows locate wim finish
2023/07/14 00:35:55.558 [PXE] [13] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.558 [PXE] [13] UDF fill override data ...
2023/07/14 00:35:55.558 [PXE] [13] PdSizeOffset=530624 tagOffset=530432
2023/07/14 00:35:55.558 [PXE] [13] UDF tag valid OK, should match it.
2023/07/14 00:35:55.558 [PXE] [13] UDF tag refresh OK.
2023/07/14 00:35:55.558 [PXE] [13] ## virt wim file </SSTR/strelec11x64Eng.wim> <480790081> <New:484689920> ...
2023/07/14 00:35:55.558 [PXE] [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.558 [PXE] [13] fix tag override 224[4012048 - 4012272] 4012088 4012032 56
2023/07/14 00:35:55.558 [PXE] [13] ## virt wim file </SSTR/strelec10x64Eng.wim> <465574664> <New:469467136> ...
2023/07/14 00:35:55.558 [PXE] [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.558 [PXE] [13] fix tag override 224[4010000 - 4010224] 4010040 4009984 56
2023/07/14 00:35:55.558 [PXE] [13] ## virt wim file </SSTR/strelec8Eng.wim> <254356707> <New:257613824> ...
2023/07/14 00:35:55.558 [PXE] [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.558 [PXE] [14] last chunk_size:2276 decompresslen:8192 tot:5742592
2023/07/14 00:35:55.558 [PXE] [13] fix tag override 224[4014096 - 4014320] 4014136 4014080 56
2023/07/14 00:35:55.558 [PXE] [13] ## virt wim file </SSTR/strelec10Eng.wim> <312366044> <New:315963392> ...
2023/07/14 00:35:55.558 [PXE] [13] file_entry and extend data in the same block.
2023/07/14 00:35:55.559 [PXE] [13] fix tag override 224[4007952 - 4008176] 4007992 4007936 56
2023/07/14 00:35:55.559 [PXE] [13] find target file, name_len:18, offset: 251296, upadte hash
2023/07/14 00:35:55.559 [PXE] [13] find target file, name_len:18, offset: 1015536, upadte hash
2023/07/14 00:35:55.559 [PXE] [13] update replace lookup entry_id:1564
2023/07/14 00:35:55.559 [PXE] [13] find meta lookup entry_id:0, update resource head and hash(1059424)
2023/07/14 00:35:55.559 [PXE] [13] find target file, name_len:18, offset: 252592, upadte hash
2023/07/14 00:35:55.559 [PXE] [13] find target file, name_len:18, offset: 1001384, upadte hash
2023/07/14 00:35:55.559 [PXE] [13] update replace lookup entry_id:1596
2023/07/14 00:35:55.559 [PXE] [13] find meta lookup entry_id:0, update resource head and hash(1048480)
2023/07/14 00:35:55.559 [PXE] [13] find target file, name_len:18, offset: 296128, upadte hash
2023/07/14 00:35:55.559 [PXE] [13] update replace lookup entry_id:1781
2023/07/14 00:35:55.559 [PXE] [13] find meta lookup entry_id:4, update resource head and hash(863040)
2023/07/14 00:35:55.559 [PXE] [13] find target file, name_len:18, offset: 291448, upadte hash
2023/07/14 00:35:55.559 [PXE] [13] update replace lookup entry_id:1717
2023/07/14 00:35:55.559 [PXE] [13] find meta lookup entry_id:0, update resource head and hash(1155424)
2023/07/14 00:35:55.559 [PXE] [13] Virt data ISO file size: 4909305856 6437040128
2023/07/14 00:35:55.559 [PXE] [13] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.559 [PXE] [13] <0> [ 530432 - 530944 512 ]
2023/07/14 00:35:55.559 [PXE] [13] <1> [ 4012032 - 4012544 512 ]
2023/07/14 00:35:55.559 [PXE] [13] <2> [ 4009984 - 4010496 512 ]
2023/07/14 00:35:55.559 [PXE] [13] <3> [ 4014080 - 4014592 512 ]
2023/07/14 00:35:55.559 [PXE] [13] <4> [ 4007936 - 4008448 512 ]
2023/07/14 00:35:55.560 [PXE] [13] ================ OVERRIDE DUMP ================
2023/07/14 00:35:55.560 [PXE] [13] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.560 [PXE] [13] <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.03.21_English.iso> WIM:4/5
2023/07/14 00:35:55.560 [PXE] [13] <01> [4909305856 - 5390096384 480790528 ] Remap
2023/07/14 00:35:55.560 [PXE] [13] <02> [4909305856 - 4909306064 208 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <03> [5390096384 - 5392670720 2574336 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <04> [5390284900 - 5390285924 1024 ] iVentoy Param
2023/07/14 00:35:55.560 [PXE] [13] <05> [5392670720 - 5393731584 1060864 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <06> [5392922016 - 5392922036 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <07> [5393686256 - 5393686276 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <08> [5393731584 - 5393995776 264192 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <09> [5393809814 - 5393809834 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <10> [5393731614 - 5393731634 20 ] WIM META CHK
2023/07/14 00:35:55.560 [PXE] [13] <11> [5393995776 - 5859571712 465575936 ] Remap
2023/07/14 00:35:55.560 [PXE] [13] <12> [5393995776 - 5393995984 208 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <13> [5859571712 - 5862146048 2574336 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <14> [5859760228 - 5859761252 1024 ] iVentoy Param
2023/07/14 00:35:55.560 [PXE] [13] <15> [5862146048 - 5863194624 1048576 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <16> [5862398640 - 5862398660 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <17> [5863147432 - 5863147452 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <18> [5863194624 - 5863462912 268288 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <19> [5863274454 - 5863274474 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <20> [5863194654 - 5863194674 20 ] WIM META CHK
2023/07/14 00:35:55.560 [PXE] [13] <21> [5863462912 - 6117820416 254357504 ] Remap
2023/07/14 00:35:55.560 [PXE] [13] <22> [5863462912 - 5863463120 208 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <23> [6117820416 - 6119993344 2172928 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <24> [6117976164 - 6117977188 1024 ] iVentoy Param
2023/07/14 00:35:55.560 [PXE] [13] <25> [6119993344 - 6120857600 864256 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <26> [6120289472 - 6120289492 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <27> [6120857600 - 6121076736 219136 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <28> [6120946680 - 6120946700 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <29> [6120857830 - 6120857850 20 ] WIM META CHK
2023/07/14 00:35:55.560 [PXE] [13] <30> [6121076736 - 6433443840 312367104 ] Remap
2023/07/14 00:35:55.560 [PXE] [13] <31> [6121076736 - 6121076944 208 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <32> [6433443840 - 6435616768 2172928 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <33> [6433599588 - 6433600612 1024 ] iVentoy Param
2023/07/14 00:35:55.560 [PXE] [13] <34> [6435616768 - 6436773888 1157120 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <35> [6435908216 - 6435908236 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <36> [6436773888 - 6437040128 266240 ] Memory
2023/07/14 00:35:55.560 [PXE] [13] <37> [6436859768 - 6436859788 20 ] WIM BIN CHK
2023/07/14 00:35:55.560 [PXE] [13] <38> [6436773918 - 6436773938 20 ] WIM META CHK
2023/07/14 00:35:55.560 [PXE] [13] ================ VIRT RANGE DUMP ================
2023/07/14 00:35:55.560 [PXE] [13] Phase2 parse image <iso/WinPE11_10_8_Sergei_Strelec_x86_x64_2023.03.21_English.iso> finished success
2023/07/14 00:35:55.560 [PXE] [14] find registry cmdline i:5734528 offset:(0x5773f8)5731320 size:(0x5e)94
2023/07/14 00:35:55.560 [PXE] [14] start offset is 0x5783fc(5735420)
2023/07/14 00:35:55.560 [PXE] [14] registry setup cmdline:<pecmd.exe MAIN %Windir%\system32\pecmdmain.ini>
2023/07/14 00:35:55.560 [PXE] [14] @ directly use pecmd.exe 000001E214DE6CB0
2023/07/14 00:35:55.560 [PXE] [14] find replace file at 000001E214DE6CB0
2023/07/14 00:35:55.560 [PXE] [14] search hash <dfee9ace54bae8964d7243ee5b3e388a22fbc7be>
2023/07/14 00:35:55.560 [PXE] [14] find replace lookup entry_id:1713 raw_size:1084928
2023/07/14 00:35:55.561 [PXE] [14] 668508 1084928 chunk_num=34
2023/07/14 00:35:55.566 [PXE] [14] last chunk_size:50 decompresslen:3584 tot:1084928
2023/07/14 00:35:55.566 [PXE] [14] jump exe </win/vtoypxe32.exe> len:155648 alignlen:155648
2023/07/14 00:35:55.566 [PXE] [14] jump_exe_len:155648 bin_raw_len:2172656 bin_align_len:2172928
2023/07/14 00:35:55.566 [PXE] [14] @@ locate wim file </SSTR/strelec8NEEng.wim> ...
2023/07/14 00:35:55.566 [PXE] [14] @@@ overlen=8 overoff=4018408 fe_entry_size_offset=4018232 start_block=304 file_offset=1494202368
2023/07/14 00:35:55.566 [PXE] [14] 10774 36184 chunk_num=2
2023/07/14 00:35:55.567 [PXE] [14] last chunk_size:1036 decompresslen:3416 tot:36184
2023/07/14 00:35:55.567 [PXE] [14] read lookup offset:17893591 size:10450
2023/07/14 00:35:55.567 [PXE] [14] search pecmd.exe 0000000000000000
2023/07/14 00:35:55.567 [PXE] [14] search winpeshl.exe 0000000000000000
2023/07/14 00:35:55.567 [PXE] [14] Failed to find replace file 0000000000000000
2023/07/14 00:35:55.567 [PXE] [14] windows locate wim finish
2023/07/14 00:35:55.567 [PXE] [14] Windows virt data new <WinPE> ...
2023/07/14 00:35:55.567 [PXE] [14] UDF fill override data ...
2023/07/14 00:35:55.567 [PXE] [14] PdSizeOffset=530624 tagOffset=530432
2023/07/14 00:35:55.567 [PXE] [14] UDF tag valid OK, should match it.
2023/07/14 00:35:55.567 [PXE] [14] UDF tag refresh OK.
2023/07/14 00:35:55.567 [PXE] [14] ## virt wim file </SSTR/strelec11x64Eng.wim> <473881169> <New:477845504> ...
2023/07/14 00:35:55.567 [PXE] [14] file_entry and extend data in the same block.
2023/07/14 00:35:55.567 [PXE] [14] fix tag override 224[4014096 - 4014320] 4014136 4014080 56
2023/07/14 00:35:55.567 [PXE] [14] ## virt wim file </SSTR/strelec10x64Eng.wim> <454039467> <New:457934848> ...
2023/07/14 00:35:55.567 [PXE] [14] file_entry and extend data in the same block.
2023/07/14 00:35:55.567 [PXE] [14] fix tag override 224[4012048 - 4012272] 4012088 4012032 56
2023/07/14 00:35:55.567 [PXE] [14] ## virt wim file </SSTR/strelec8Eng.wim> <248376456> <New:251631616> ...
2023/07/14 00:35:55.567 [PXE] [14] file_entry and extend data in the same block.
Posts: 1,358
Threads: 86
Joined: Apr 2020
Reputation:
133
iVentoy may have bug when parsing some non-standard or corrupted or unsupported ISO files.
So please put some ISO files and test and then put some more ISO files and test .....
Finally you should find that which ISO file(s) cause the problem.
Share me the ISO file for test if you find .
Posts: 6
Threads: 2
Joined: Jun 2023
Reputation:
0
(07-14-2023, 01:14 AM)longpanda Wrote: iVentoy may have bug when parsing some non-standard or corrupted or unsupported ISO files.
So please put some ISO files and test and then put some more ISO files and test .....
Finally you should find that which ISO file(s) cause the problem.
Share me the ISO file for test if you find . Hey longpanda,
now it works!
I selected some of the ISO files and iVentoy 1.0.11 started without any problems.
Now I want to boot and test the exported ISO files one by one, I'll get back to you on that.
Many thanks and friendly greetings.
Posts: 6
Threads: 2
Joined: Jun 2023
Reputation:
0
(07-14-2023, 07:39 PM)Oma Voss Wrote: (07-14-2023, 01:14 AM)longpanda Wrote: iVentoy may have bug when parsing some non-standard or corrupted or unsupported ISO files.
So please put some ISO files and test and then put some more ISO files and test .....
Finally you should find that which ISO file(s) cause the problem.
Share me the ISO file for test if you find . Hey longpanda,
now it works!
I selected some of the ISO files and iVentoy 1.0.11 started without any problems.
Now I want to boot and test the exported ISO files one by one, I'll get back to you on that.
Many thanks and friendly greetings. Here are the first test results: Successfully booted with iVentoy 1.0.11 Server on a Win11-Maschine with legaca boot:
Acronis Snap Deploy 6.0.3900 Update 1 BootCD.iso
Acronis_WinPE_Sergei_Strelec_x64.iso (russian language)
HBCD_PE_x64.iso
MiniTool_Power_Data_Recovery_Business_Technician_11_WinPE_x64.iso
NHV-BOOT-2023-V1300-EXTREME.iso
WinPE11_11_10_8_Sergei_Strelec_x86_x64_2023.06.25_English.iso
openmediavault_6.0.24-amd64.iso
I tested another 10 ISO files, with them the PXE service is started, but the client does not boot with them.
Posts: 6
Threads: 2
Joined: Jun 2023
Reputation:
0
07-16-2023, 08:25 PM
(This post was last modified: 07-16-2023, 08:29 PM by Oma Voss.)
(07-16-2023, 07:14 PM)Oma Voss Wrote: (07-14-2023, 07:39 PM)Oma Voss Wrote: (07-14-2023, 01:14 AM)longpanda Wrote: iVentoy may have bug when parsing some non-standard or corrupted or unsupported ISO files.
So please put some ISO files and test and then put some more ISO files and test .....
Finally you should find that which ISO file(s) cause the problem.
Share me the ISO file for test if you find . Hey longpanda,
now it works!
I selected some of the ISO files and iVentoy 1.0.11 started without any problems.
Now I want to boot and test the exported ISO files one by one, I'll get back to you on that.
Many thanks and friendly greetings. Here are the first test results: Successfully booted with iVentoy 1.0.11 Server on a Win11-Machine with legacy boot:
Acronis Snap Deploy 6.0.3900 Update 1 BootCD.iso
Acronis_WinPE_Sergei_Strelec_x64.iso (russian language)
HBCD_PE_x64.iso
MiniTool_Power_Data_Recovery_Business_Technician_11_WinPE_x64.iso
NHV-BOOT-2023-V1300-EXTREME.iso
WinPE11_11_10_8_Sergei_Strelec_x86_x64_2023.06.25_English.iso
openmediavault_6.0.24-amd64.iso
I tested another 10 ISO files, with them the PXE service is started, but the client does not boot with them.
I testting DLC Boot 2023 v4.3.iso -> CDBOOT: Couldn't find BOOTMGR
|