glennpm

Member
Joined
Jul 30, 2025
Messages
95
Details

- Dual boot system; Windows 11 & Ubuntu

- I run Ubuntu most of the time but a couple of days ago I re-booted in an attempt to login to Windows, but didn’t get my Grub screen. Last boot to Windows was fine with no issues back a couple of weeks ago. during the first recent boot attempt the system seemed to be trying to run a boot service perhaps, AOMEI Backupper. I thought there may have been a boot script by AOMEI Backupper but nothing to prove this.

- DELL Inspirion laptop

- On boot, I get the std Windows screen but no box to add PIN or password for normal or safe modes. I get into SAFE mode via a Windows startup iso

- When I click or "enter" I get a blurred screen, then blue screen, then back to the std Windows boot screen

- Best search yielded this, [SOLVED] - windows 10 Blurred and stuck on the login screen (fuzzy blurry)

- I ran all the Windows install/repair iso options to no avail.



BOOT Mode is set to: UEFI with Legacy OPROH; Secure

UEFI BOOT:

HDD1-Windows Boot Manager (Samsung SSD 870 EVO 1TB)

ISB1-1

HDD2-ubuntu (Samsung SSD 870 EVO

********

DISKPART> list volume

Volume ### Ltr Label Fs Type Size Status Info

._ _ _

— — — — — —.— ————————— ——————

Volume e L CCC0MA_X64F UDF DVD-ROM 5549 MB Healthy

Volume i C Windows NTFS Partition 150 GB Healthy

Volume 2 D D_on_DELL NTFS Partition 703 GB Healthy

Volume 3 ESP FAT32 Partition 499 MB Healthy Hidden

Volume 4 WINRETOOLS NTFS Partition 750 MB Healthy Hidden

Volume 5 F NTFS Partition 853 MB Healthy Hidden

Volume 6 G PBR Image NTFS Partition 7409 MB Healthy Hidden

Volume 7 H WD4TB-Dell NTFS Partition 3399 GB Healthy

Volume 8 I RAW Partition 299 GB Healthy

Volume 9 J Ventoy-Baks exFAT Partition 831 GB Healthy

Volume 10 VTOYEFI FAT Partition 32 MB Healthy

DISKPART> select volume

********

I've run these commands:

K:\sources>bootrec.exe /fixmbr

The operation completed successfully.

K:\sources>bootrec.exe /fixboot

Access is denied.

K:\sources>bootrec.exe /scanos

Scanning all disks for Windows installations.

’lease wait, since this may take a while...

Successfully scanned Windows installations.

Total identified Windows installations: 0

The operation completed successfully.

K:\sources>bootrec.exe /rebuildbcd

Scanning all disks for Windows installations.

Please wait, since this may take a while...

Successfully scanned Windows installations.

Total identified Windows installations: 0

The operation completed successfully.

K:\sources>bcdboot C:\windows

Boot files successfully created.

X:\sources>

**********

Deleted all files inside caches, %windir%\system32\config\systemprofile\appdata\local\microsoft\windows\caches

***********

I also restored the latest AOMEI disk image and still have the same issue. Seems like there is an issue with my boot records

#########

PASTEBIN urls:

Paste from boot-repair application Ubuntu Pastebin

Paste from boot-info Ubuntu Pastebin
 

Still won't install driver via, "
1) After removing the Enum key, you can also run pnputil under the SYSTEM account (sometimes helpful). Use PsExec to run a SYSTEM prompt:
C:\Tools\psexec.exe -s -i cmd.exe
Then in that SYSTEM prompt run the pnputil add-driver command (same path). This runs the installer with SYSTEM privileges."

"added driver packages: 0"
 

Thanks — that’s very helpful detail. You’ve confirmed the exact failure (“Failed to add driver package: The configuration registry database is corrupt”) and that RegBack contains no backups (0 bytes), so the usual RegBack restore isn’t available.
At this point the problem is almost certainly Windows refusing to write the device/driver entries into the registry (permissions/hive corruption or damaged ACLs), not the Realtek driver or hardware (Ubuntu works and DevCon shows the PCI instance).
Below are three follow‑up actions (ordered low risk → higher impact). Try them in sequence and report results. I give exact commands and what to expect.
If you want to skip ahead: the safest reliable fix at this point is an in‑place repair/upgrade of Windows (keeps apps/files). I’ll cover that as option 3, but try the lighter fixes first.
———————————
STEP 1 — run SFC now (quick, non‑destructive)
Why: SFC can repair registry‑related resource files that DISM may not touch. You already ran DISM successfully, but SFC is still needed.
Run in an elevated Command Prompt:
sfc /scannow
  • If SFC finds and repairs files, reboot and retry the manual INF install:
    pnputil /add-driver "D:\Reference\…\rt640x64.inf" /install
  • Paste the full pnputil output if it still fails.
(You already ran DISM and chkdsk; good. DISM success was noted earlier.)
———————————
STEP 2 — reset registry/security ACLs (most likely to help)
Why: “configuration registry database is corrupt” often appears when Windows cannot create/update keys under Enum or related device branches because ACLs (permissions) are broken. Two safe ways to reset registry ACLs to defaults:
Option A — use secedit to restore default system security settings (no downloads required)
Run these as Administrator (one line at a time):
secedit /configure /cfg %windir%\inf\defltbase.inf /db defltbase.sdb /verbose
shutdown /r /t 5
After reboot, try the INF install (run as Admin; if you prefer run as SYSTEM via PsExec):
pnputil /add-driver "D:\Reference\…\rt640x64.inf" /install
Why this: secedit applies Microsoft’s default ACL template and can fix registry permissions that block device installs.
Option B — (if you prefer or secedit doesn’t fix) use SubInACL to reset registry permissions
  • Download and install Microsoft’s SubInACL (from another PC if needed), copy to the laptop, then run (Admin CMD):
cd "C:\Program Files (x86)\Windows Resource Kits\Tools"
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=administrators=f /grant=system=f
subinacl /subkeyreg HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum /grant=system=f /grant=administrators=f
  • Reboot and re‑try pnputil.
Note: SubInACL requires download; secedit is built into Windows so I recommend secedit first.
IMPORTANT: Before doing either, export a registry backup for safety (you already took hives backup earlier — good). If you want, I can give exact SubInACL download link and the full script.
———————————
STEP 3 — forced re‑create of device node (if permissions fixed)
If you previously deleted the Enum key or used devcon, do this AFTER you reset ACLs:
1) Run devcon rescan (Admin) or use Device Manager → Action → Scan for hardware changes.
2) Install driver (Admin) or run pnputil as SYSTEM to be sure:
  • If you have PsExec: psexec -s -i cmd.exe (opens SYSTEM cmd window)
  • From that SYSTEM window run:
    pnputil /add-driver "D:\Reference\…\rt640x64.inf" /install
If the driver installs under SYSTEM but not under Admin, that proves an ACL/permission problem — resetting with secedit/SubInACL should permanently fix it.
You tried PsExec + pnputil and got “added driver packages: 0” — which means Windows still could not write driver metadata; that lines up with broken ACLs or other hive damage.
———————————
STEP 4 — if step 2/3 fail: next choices (pick one)
A — In‑place Repair / Upgrade (recommended if you want to avoid a clean reinstall)
  • Create Windows install media (matching Windows version), run setup.exe inside Windows, choose Upgrade / Repair and select “Keep personal files and apps.” This refreshes system files and registry structure while keeping programs/files. You already prepared an image so this is safe. This is the least painful “nuclear” fix and usually resolves odd registry/permission corruption.
B — Clean reinstall (last resort)
  • Since you have a Clonezilla image, you could restore image, or do fresh install; but I’d prefer the repair install before this.
C — Temporary practical workaround
  • Use a cheap USB‑Ethernet or USB Wi‑Fi dongle in Windows so you can get online and install drivers/Windows updates. Sometimes Windows Update will repair whatever prevents internal NIC driver installation. This is the fastest way to get the machine usable.
———————————
Diagnostics I still want if you try the ACL reset and it fails
If the secedit/SubInACL steps don’t allow pnputil to add the driver, paste these outputs (Admin):
1) Results of SFC:
sfc /scannow (copy any “found and repaired” lines)
2) Kernel‑PnP event around the driver install attempt (Admin PowerShell):
Get-WinEvent -FilterHashtable @{LogName='System'; ProviderName='Microsoft-Windows-Kernel-PnP'; StartTime=(Get-Date).AddMinutes(-60)} | Format-List TimeCreated,Id,LevelDisplayName,Message
(You tried Kernel‑PnP earlier and it returned little—still give it another try after any ACL changes.)
3) After secedit run, show whether the Enum key is writable:
  • Try this in Admin PowerShell (to confirm permissions):
    (Get-Acl 'HKLM:\SYSTEM\CurrentControlSet\Enum\PCI\VEN_10EC&DEV_8136&SUBSYS_06411028&REV_07').Access | Format-Table
Paste that output if you see errors.
———————————
If you want me to walk you through secedit + pnputil now, say “Do secedit now” and I’ll give the exact copy‑paste steps and what you should watch for (and I’ll stay on this thread until you paste results). If you prefer SubInACL I’ll provide the small download link and the exact commands. If you want me to fetch the Dell driver package and point to the exact INF inside it, I can do that too.
Recap / immediate recommendation
  • Run sfc /scannow (if you haven’t).
  • Run secedit to restore default ACLs: secedit /configure /cfg %windir%\inf\defltbase.inf /db defltbase.sdb /verbose, reboot, then try pnputil (or pnputil from a PsExec SYSTEM prompt).
  • If that fixes it, great; if not, we move to SubInACL or an in‑place repair upgrade.
You’re very close — your outputs show the PCI instance is present (DevCon found the Realtek PCI ID) but Windows cannot register the driver package due to registry/ACL problems, and resetting ACLs or doing an in‑place repair normally resolves that.
Which path do you want to try right now — secedit (fast, built‑in), SubInACL, or go straight to an in‑place repair? If secedit, say “Go secedit” and I’ll provide the exact steps again and stay ready for the results.
 

2 and 3 failed so please help with

STEP 4 — if step 2/3 fail: next choices (pick one)
A — In‑place Repair / Upgrade (recommended if you want to avoid a clean reinstall)
  • Create Windows install media (matching Windows version), run setup.exe inside Windows, choose Upgrade / Repair and select “Keep personal files and apps.” This refreshes system files and registry structure while keeping programs/files. You already prepared an image so this is safe. This is the least painful “nuclear” fix and usually resolves odd registry/permission corruption.
 

Okay — let’s do the in‑place Repair/Upgrade (keeps your files/apps) step by step. This is the recommended next move now that registry hive backups (RegBack) are empty and other repairs haven’t allowed the Realtek driver to be installed. You already have a Clonezilla image — excellent. Follow these instructions exactly and paste any error messages/log excerpts if something goes wrong; I’ll walk you through fixes.
Pre‑flight checklist (do these BEFORE starting)
  • Confirm you have a current full image (you do — Clonezilla).
  • Make sure the laptop is plugged into AC and will not lose power.
  • Free up disk space on C: (at least 20–30 GB recommended). Check: open Admin CMD → dir C:\ or check in File Explorer.
  • Suspend BitLocker if enabled: open an elevated CMD and run:
    manage-bde -status
    If protectors exist, suspend: manage-bde -protectors -disable C: -RebootCount 1
  • Temporarily disable third‑party antivirus/security software.
  • Disconnect all unnecessary USB devices and external drives (leave only the USB with the install media when ready). This avoids the installer picking the wrong drive/creating problems.
  • Note your Windows edition and build: press Win+R → winver → note the exact edition (Home/Pro) and build number. You’ll use the matching installer.
Step A — Create Windows install media (USB) on another PC
  • Go to Microsoft’s Download Windows page and create media (Media Creation Tool) or download the ISO. Use the same edition/architecture (x64) that your current Windows has. (If you want, tell me your exact edition/build and I’ll confirm which ISO to use.)
  • Use the Media Creation Tool to “Create installation media (USB flash drive)”. Let it finish.
Step B — Prepare your Windows system for the upgrade
  • With Windows running, insert the USB installer. If you have BitLocker suspended, good.
  • Open the USB drive in File Explorer and run setup.exe as Administrator (right‑click → Run as administrator). Do NOT boot from the USB — run setup from inside Windows.
Step C — Run the in‑place upgrade and pick the Repair option
  • When Setup launches: choose to download updates (recommended) so Setup can get the latest fixes.
  • Accept license. When asked “Choose what to keep”, select: Keep personal files and apps. This is the in‑place Repair/Upgrade.
  • Let the installer run. It will reboot several times; DO NOT interrupt. This can take 30–90 minutes depending on your hardware and updates.
What the installer will do
  • Refresh all Windows system files and registry structure while preserving installed apps, settings, and files. It will also reinstall default drivers. This normally repairs registry corruption that blocks device driver installation.
After the upgrade finishes
  1. Reboot to the desktop, sign in.
  2. Run Windows Update (Settings → Update & Security) and install any drivers/updates. Reboot again if prompted.
  3. Check Device Manager → Network adapters for the Realtek PCIe FE Family Controller. If not present, try to install the Realtek INF manually:
    • Open elevated CMD and run:
      pnputil /add-driver "D:\path\to\rt640x64.inf" /install
    • Or re-run Dell driver EXE you downloaded.
  4. If Realtek still fails to install, gather logs (below) and post them here.
If the upgrade fails (or you get a setup error)
  • Capture the setup logs before retrying. Look in:
    • C:\$WINDOWS.~BT\Sources\Panther\setupact.log
    • C:\$WINDOWS.~BT\Sources\Panther\setuperr.log
    • Also check: C:\Windows\Panther\UnattendGC\setupact.log
  • Paste the tail (last 100 lines) of setuperr.log or setupact.log here and I’ll review.
Notes & extra precautions for your dual‑boot
  • Running setup.exe from inside Windows is safe for your Ubuntu partitions; it generally only updates the Windows boot files or Boot Manager, which can change the boot order so Windows becomes the default. If GRUB disappears after the upgrade, you can restore it from an Ubuntu Live USB easily:
    • Boot Ubuntu Live → open Terminal → sudo mount /dev/sdXY /mnt (where sdXY is your Ubuntu root) → sudo grub-install --boot-directory=/mnt/boot /dev/sdX (install to the drive device, not partition) → sudo update-grub.
    • Or use Boot-Repair. If you want, I’ll give the exact commands for your drive layout after the upgrade.
  • If you prefer even safer: create a Windows Recovery USB (from Control Panel → Recovery → Create a recovery drive) before you run the upgrade so you can repair boot if needed.
If you want me to run through this interactively with you
  • Say “Start now” and tell me when the installer begins; I’ll be on standby to help with any prompts, to interpret setup logs if it fails, and to walk you through post‑upgrade steps (driver install, Windows Update, restoring GRUB if necessary).
If you’d rather try one more low‑risk fix first
  • I can walk you through resetting Windows ACLs with secedit (built‑in) or SubInACL — but given you already tried several lower steps and RegBack is empty, the in‑place repair is the most reliable next move.
Which do you want to do now — proceed with the in‑place upgrade, or try ACL reset (secedit) first? If in‑place upgrade, confirm you want step‑by‑step and I’ll provide a short checklist and the exact place to paste setup logs if anything fails.
 

Use the same edition/architecture (x64) that your current Windows has. (If you want, tell me your exact edition/build and I’ll confirm which ISO to use.)

Edition Windows 10 Home
Version 2009
Installed on ‎3/‎4/‎2024
OS Build 19045.5608
 

Perfect — thanks for the Windows edition/build info (Windows 10 Home, build 19045.5608). That matches Windows 10, version 22H2 (build 19045.x), so the safe, supported route is to use the official Windows 10 Media Creation Tool / ISO from Microsoft and run setup.exe from inside Windows to perform an in‑place Repair/Upgrade and “Keep personal files and apps.” Microsoft documents the tool and the in‑place workflow on its site. (microsoft.com)
I’ll give a concise, step‑by‑step in‑place repair procedure you can follow now — plus exactly what to check if anything goes wrong and the logs to collect so I can help troubleshoot immediately.
Before you start — PREP CHECK (do these now)
  • You already have a Clonezilla image — excellent. That’s your safety net.
  • Plug the laptop into AC. Don’t run on battery.
  • Free disk space: aim for ≥20–30 GB free on C:. To check in an elevated Command Prompt run:
    dir C:\
  • Suspend BitLocker (if enabled): open Admin PowerShell/CMD and run:
    manage-bde -status
    If you see protectors enabled, suspend them temporarily:
    manage-bde -protectors -disable C: -RebootCount 1
  • Temporarily disable third‑party AV/security and unplug non‑essential USB drives (only leave the USB installer when ready).
  • Note down your Windows license status (digital license embedded in firmware or product key) — typically not needed for an in‑place upgrade if the machine was activated already.
Step 1 — Get the official Windows 10 installer (Media Creation Tool / ISO)
  • Go to Microsoft’s Windows 10 download page and download the Media Creation Tool (or ISO). Use the tool or ISO that targets Windows 10 (22H2 / build 19045) — that will match your installed build family. (microsoft.com, en.wikipedia.org)
  • Two ways:
    • Simplest: Download the Media Creation Tool and run it on your laptop; choose “Upgrade this PC now.” (This downloads and runs the upgrade in place.)
    • Alternate (recommended if you prefer USB/ISO): Use the Media Creation Tool on any PC to “Create installation media for another PC” (USB or ISO). If you make an ISO, copy it to this laptop, right‑click → Mount, then run setup.exe from the mounted ISO.
Step 2 — Run setup.exe from inside Windows (in‑place repair/upgrade)
  • Right‑click setup.exe → Run as administrator.
  • When prompted choose to download updates (recommended) so Setup can pick up latest fixes. Click Next.
  • On “Choose what to keep” choose Keep personal files and apps. This is the in‑place Repair/Upgrade mode that reinstalls system files and rebuilds the registry while keeping your programs and files.
  • Proceed and allow the installer to run. It will reboot several times. Do not interrupt.
What to expect
  • The process typically takes 30–90 minutes depending on hardware and whether updates are included.
  • Setup will show progress and reboot automatically. When it finishes you’ll be back at the desktop.
After the upgrade completes
1) Sign in and check:
  • Device Manager → Network adapters — look for “Realtek PCIe FE Family Controller” or similar.
  • If it’s not automatically present, try the manual INF install again (point to the extracted driver folder) or run pnputil from an elevated prompt:
    pnputil /add-driver "D:\path\to\rt640x64.inf" /install
    2) Run Windows Update (Settings → Update & Security → Check for updates). Install driver updates offered there.
    3) Re‑enable any antivirus and re‑enable BitLocker if you suspended it:
    manage-bde -protectors -enable C:
    4) If GRUB/Ubuntu boot entry changed (rare for in‑place upgrade), I can give the exact commands to restore GRUB — you should be able to boot Ubuntu from the firmware boot menu (F12) and then repair GRUB if necessary.
If setup fails — collect these logs and paste the tail (last 100 lines)
  • setupact.log and setuperr.log (setup logs are the most useful):
    • C:\$WINDOWS.~BT\Sources\Panther\setupact.log
    • C:\$WINDOWS.~BT\Sources\Panther\setuperr.log
    • Also: C:\Windows\Panther\UnattendGC\setupact.log
  • You can extract the last 200 lines quickly in PowerShell (Admin):
    Get-Content C:\$WINDOWS.~BT\Sources\Panther\setuperr.log -Tail 200 | Out-String
    Get-Content C:\$WINDOWS.~BT\Sources\Panther\setupact.log -Tail 200 | Out-String
    Paste the captured text here and I’ll decode the exact error and next step.
If the upgrade completes but Realtek still fails to install
  • Try running pnputil from an elevated SYSTEM prompt (PsExec method) and post the pnputil output. You already tried but the in‑place repair often fixes the underlying registry problems that blocked writes.
  • If still blocked after upgrade, paste the pnputil failure text and we’ll run secedit/SubInACL or (if needed) move to targeted hive repair — but that’s rarely necessary after a successful in‑place upgrade.
Windows 10 lifecycle note
  • Microsoft’s support policy: Windows 10 will reach end of support on October 14, 2025 — after that date Windows 10 will no longer receive free security updates. If your device is eligible you should plan an upgrade to Windows 11 in the near future. I mention this only so you’re aware (and we pick the most appropriate install media now). (microsoft.com, en.wikipedia.org)
Would you like me to
  • (A) fetch the direct Media Creation Tool link for you and confirm the exact button to click? (I can paste that link.) — I already showed the Microsoft page above, but I can fetch and paste the direct “Download now” link if you want. (microsoft.com)
  • (B) walk you through the upgrade live (I’ll stay in the thread while you run setup.exe and troubleshoot any prompts)?
  • (C) give the exact WinRE / hive‑restore instructions instead (only if you prefer to try more targeted registry fixes before the upgrade)? RegBack was empty earlier, so the hive restore is not available — that’s why I recommended the in‑place upgrade.
Pick A, B, or C (or “Start now” to begin). If you choose B say when you’ll start the installer and I’ll stay ready for the logs / next prompts.
 

The installation failed! Now what should I do?
 

Sorry the repair failed — I know that’s frustrating. Let’s approach this methodically so we find the specific cause and fix it without needless reinstalls.
First priority: collect the setup/rollback logs so we can see exactly why Setup failed. Then we’ll try the safest retry steps (clean‑boot + unplug peripherals + fresh ISO), and only if those fail we’ll move to targeted fixes. I’ll give copy‑paste commands you can run in an elevated PowerShell/CMD to collect everything I need and a short checklist to try a clean retry.
1) Collect the Windows Upgrade logs (do this now)
Run PowerShell as Administrator and paste the output(s) here (or zip and attach C:\Users\Public\UpgradeLogs.zip).
PowerShell (Admin) — copy and paste these commands line‑by‑line:
  • Show the last 200 lines of the main error log:
    Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setuperr.log' -Tail 200 | Out-String
  • Show the last 400 lines of the main activity log:
    Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setupact.log' -Tail 400 | Out-String
  • If the installer rolled back, collect the rollback logs:
    Get-Content 'C:\$WINDOWS.~BT\Sources\Rollback\setupact.log' -Tail 400 | Out-String
    Get-Content 'C:\$WINDOWS.~BT\Sources\Rollback\setuperr.log' -Tail 200 | Out-String
  • Also capture the Panther and UnattendGC logs:
    Get-ChildItem 'C:\Windows\Panther' -Recurse -Filter *.log | ForEach-Object { Get-Content $.FullName -Tail 200 | Out-String; "`n---- $.FullName ----`n" }
    Get-Content 'C:\Windows\Panther\UnattendGC\setupact.log' -Tail 200 | Out-String
  • Zip them (optional, good for attaching):
    Compress-Archive -Path 'C:\$WINDOWS.~BT\Sources\Panther*','C:\$WINDOWS.~BT\Sources\Rollback*','C:\Windows\Panther*' -DestinationPath 'C:\Users\Public\UpgradeLogs.zip' -Force
If any of the paths above do not exist, tell me which ones were missing. Paste the text output of the Get-Content commands here (or attach UpgradeLogs.zip). I will parse the exact error lines and tell you the targeted fix.
2) Quick items to try before a second in‑place attempt (do these now)
These commonly fix upgrade blockers (drivers, 3rd‑party software, peripherals):
  • Disconnect everything non‑essential: USB drives, USB printers, external disks, USB hubs, dongles. Only keep keyboard/mouse if needed.
  • Uninstall (or at least disable) third‑party antivirus, VPN clients (you had Surfshark), AOMEI, and any backup/snapshot tools. Reboot.
  • Boot Windows into a Clean Boot:
    • msconfig → Services → check “Hide Microsoft services” → Disable all → Startup tab → Open Task Manager → Disable all startup items → Reboot.
  • Retry the in‑place upgrade from the mounted ISO (right‑click setup.exe → Run as administrator). Use a freshly downloaded ISO (the Media Creation Tool or ISO from Microsoft) to rule out a corrupt download. If you want, I can give the exact official link for Windows 10 22H2.
3) If the retry fails — give me the log outputs you collected
Common failure signatures I’ll look for:
  • Migration plugin errors (device/driver migration issues) — usually near the top of setuperr.log.
  • “0xC1900101” family = driver problems (we’ll identify the driver).
  • Errors referencing rollback or I/O (ERROR_GEN_FAILURE) = disk/hardware issue or antivirus interfering.
  • “Configuration registry database is corrupt” or access errors = registry/hive/permission problem (we tried earlier fixes; I’ll re‑evaluate if this is shown).
4) If the logs show a specific device or driver blocking setup
I’ll give targeted steps such as:
  • Remove the offending driver/device from Device Manager (or from Enum registry) or uninstall its software before retry.
  • For network/Realtek issues we’ll either install from INF in WinPE or use an alternate NIC temporarily (USB Ethernet) until Windows Update fixes the registry.
  • If registry/hive corruption is still present, I’ll give the exact WinRE hive replace or the recommended in‑place repair steps (you already tried repair once; logs will tell whether Setup failed on a particular component).
5) If you want me to walk you through a second in‑place attempt interactively
Say “I’ll retry now” and run the clean‑boot steps above first. Start the setup.exe and if it fails, immediately paste the last 100 lines of setuperr.log and setupact.log (I’ll tell you exactly where to look if Setup is still rolling back). If you post the log tail I’ll interpret it within minutes.
TL;DR — immediate next actions
  1. Run the PowerShell Get-Content commands above and paste the outputs (or attach C:\Users\Public\UpgradeLogs.zip).
  2. While logs upload, do a Clean Boot and disconnect peripherals.
  3. Retry setup from a freshly downloaded ISO if you can.
I’ll parse the logs and give the exact fix (most likely: uninstall a stubborn third‑party driver/service, remove a particular registry node, or retry with a clean ISO). If you want, I can also fetch the official Media Creation Tool link for Windows 10 22H2 for you — say “get ISO link”.
References: I asked you earlier to collect the same Panther & rollback logs; those are the exact files I need to identify the failure.
Ready when you are — paste the log tails or attach UpgradeLogs.zip and I’ll diagnose the failure line‑by‑line.
 

Here are the logs. I will now use msconfig as you directed.
 

Attachments

Thanks — and good call doing the msconfig clean boot. Since the repair failed we need the specific failure lines from the setup logs to know exactly what blocked the upgrade.
I don’t have direct access to the uploaded files in this environment, so please either paste the relevant log excerpts here or run the short PowerShell commands below and paste the results. I’ll parse them immediately and give the next targeted fix.
1) From an Administrator PowerShell, extract the most relevant error lines (copy/paste the whole output)
Run these four commands (one at a time) and paste their outputs here:
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setuperr.log' -Tail 200 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setupact.log' -Tail 400 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Rollback\setuperr.log' -Tail 200 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Rollback\setupact.log' -Tail 400 | Out-String
If any of those files are missing, tell me which path was not found.
2) Quick grep for obvious failure tokens (optional, faster)
If you prefer, run this and paste its output — it shows likely causes (errors, fatal, 0x codes):
Select-String -Path 'C:\$WINDOWS.~BT**.log','C:\Windows\Panther**.log' -Pattern 'Error','Fatal','0x','rollback','FAILED' -SimpleMatch | Select-Object LineNumber, Filename, Line | Out-String
3) If the installer rolled back you can also provide these (they’re often the decisive logs)
  • C:\$WINDOWS.~BT\Sources\Rollback\setupact.log
  • C:\$WINDOWS.~BT\Sources\Rollback\setuperr.log
4) While you gather logs — retry the install with these precautions (most common blockers)
  • Ensure clean boot is active (msconfig → Services: hide Microsoft services → disable others; Startup → open Task Manager → disable all).
  • Uninstall Surfshark / other VPN client temporarily (they frequently block upgrade phases). Also uninstall AOMEI tooling, third‑party backup, and any disk encryption tools. Reboot.
  • Disconnect all USB devices except the USB mouse/keyboard and the installer USB if you used one.
  • Re‑mount a freshly downloaded official Windows 10 22H2 ISO (or recreate USB with Media Creation Tool) to ensure installer source is good.
  • Run setup.exe from the mounted ISO (right‑click → Run as administrator) and choose Keep personal files & apps.
5) If the setup fails again, copy/paste only the last 40–80 lines of setuperr.log and setupact.log (that’s usually more than enough); I’ll parse them and give the exact targeted action (uninstall a driver/service, fix a registry ACL, or run a small WinRE hive copy).
6) If you want, I can:
  • Review the exact logs you uploaded (tell me the filenames you attached so I can look for them), or
  • Walk you step‑by‑step while you re-run setup (I’ll be on standby for the logs and prompts).
Next step for you now
  • Paste the outputs of the four Get-Content commands above (or the results of the Select-String search). I’ll read them and tell you precisely why the installer rolled back and the exact fix to try next.
 

Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.

Try the new cross-platform PowerShell Install PowerShell on Windows, Linux, and macOS - PowerShell

PS C:\Windows\system32> Get-Content 'C:\Windows\Panther\UnattendGC\setupact.log' -Tail 80 | Out-String
2025-08-14 00:47:09, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 00:47:09, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 00:47:09, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0
2025-08-14 00:47:18, Info [RelPost.exe] Enter WinReGetLogDirPath
2025-08-14 00:47:18, Info [RelPost.exe] Update enhanced config info is enabled.
2025-08-14 00:47:19, Info [RelPost.exe] WinRE is installed
2025-08-14 00:47:19, Info [RelPost.exe] Exit WinReGetLogDirPath return error code: 0x0
2025-08-14 00:47:19, Info [RelPost.exe] Enter WinReSetTriggerFile
2025-08-14 00:47:19, Info [RelPost.exe] Parameters: DirName: \\?\GLOBALROOT\device\harddisk0\partition8\Recovery\Logs, fDelete: 1
2025-08-14 00:47:19, Warning [RelPost.exe] WinReSetTriggerFile failed to delete file (0x2) in file base\diagnosis\srt\reagent2\reagent\logfile.cpp line 237
2025-08-14 00:47:19, Info [RelPost.exe] Exit WinReSetTriggerFile return error code: 0x2
2025-08-14 03:22:08, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 03:22:08, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 03:22:08, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0
2025-08-14 03:22:19, Info [RelPost.exe] Enter WinReGetLogDirPath
2025-08-14 03:22:19, Info [RelPost.exe] Update enhanced config info is enabled.
2025-08-14 03:22:20, Info [RelPost.exe] WinRE is installed
2025-08-14 03:22:20, Info [RelPost.exe] Exit WinReGetLogDirPath return error code: 0x0
2025-08-14 03:22:20, Info [RelPost.exe] Enter WinReSetTriggerFile
2025-08-14 03:22:20, Info [RelPost.exe] Parameters: DirName: \\?\GLOBALROOT\device\harddisk0\partition8\Recovery\Logs, fDelete: 1
2025-08-14 03:22:20, Warning [RelPost.exe] WinReSetTriggerFile failed to delete file (0x2) in file base\diagnosis\srt\reagent2\reagent\logfile.cpp line 237
2025-08-14 03:22:20, Info [RelPost.exe] Exit WinReSetTriggerFile return error code: 0x2
2025-08-14 03:31:56, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 03:31:56, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 03:31:56, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0
2025-08-14 03:32:05, Info [RelPost.exe] Enter WinReGetLogDirPath
2025-08-14 03:32:05, Info [RelPost.exe] Update enhanced config info is enabled.
2025-08-14 03:32:06, Info [RelPost.exe] WinRE is installed
2025-08-14 03:32:06, Info [RelPost.exe] Exit WinReGetLogDirPath return error code: 0x0
2025-08-14 03:32:06, Info [RelPost.exe] Enter WinReSetTriggerFile
2025-08-14 03:32:06, Info [RelPost.exe] Parameters: DirName: \\?\GLOBALROOT\device\harddisk0\partition8\Recovery\Logs, fDelete: 1
2025-08-14 03:32:06, Warning [RelPost.exe] WinReSetTriggerFile failed to delete file (0x2) in file base\diagnosis\srt\reagent2\reagent\logfile.cpp line 237
2025-08-14 03:32:06, Info [RelPost.exe] Exit WinReSetTriggerFile return error code: 0x2
2025-08-14 03:51:17, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 03:51:17, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 03:51:17, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0
2025-08-14 03:51:24, Info [RelPost.exe] Enter WinReGetLogDirPath
2025-08-14 03:51:24, Info [RelPost.exe] Update enhanced config info is enabled.
2025-08-14 03:51:24, Info [RelPost.exe] WinRE is installed
2025-08-14 03:51:24, Info [RelPost.exe] Exit WinReGetLogDirPath return error code: 0x0
2025-08-14 03:51:24, Info [RelPost.exe] Enter WinReSetTriggerFile
2025-08-14 03:51:24, Info [RelPost.exe] Parameters: DirName: \\?\GLOBALROOT\device\harddisk0\partition8\Recovery\Logs, fDelete: 1
2025-08-14 03:51:24, Warning [RelPost.exe] WinReSetTriggerFile failed to delete file (0x2) in file base\diagnosis\srt\reagent2\reagent\logfile.cpp line 237
2025-08-14 03:51:24, Info [RelPost.exe] Exit WinReSetTriggerFile return error code: 0x2
2025-08-14 04:56:13, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 04:56:13, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 04:56:13, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0
2025-08-14 04:56:26, Info [RelPost.exe] Enter WinReGetLogDirPath
2025-08-14 04:56:26, Info [RelPost.exe] Update enhanced config info is enabled.
2025-08-14 04:56:28, Info [RelPost.exe] WinRE is installed
2025-08-14 04:56:28, Info [RelPost.exe] Exit WinReGetLogDirPath return error code: 0x0
2025-08-14 04:56:28, Info [RelPost.exe] Enter WinReSetTriggerFile
2025-08-14 04:56:28, Info [RelPost.exe] Parameters: DirName: \\?\GLOBALROOT\device\harddisk0\partition8\Recovery\Logs, fDelete: 1
2025-08-14 04:56:28, Warning [RelPost.exe] WinReSetTriggerFile failed to delete file (0x2) in file base\diagnosis\srt\reagent2\reagent\logfile.cpp line 237
2025-08-14 04:56:28, Info [RelPost.exe] Exit WinReSetTriggerFile return error code: 0x2
2025-08-14 06:34:36, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 06:34:36, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 06:34:36, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0
2025-08-14 06:34:48, Info [RelPost.exe] Enter WinReGetLogDirPath
2025-08-14 06:34:48, Info [RelPost.exe] Update enhanced config info is enabled.
2025-08-14 06:34:49, Info [RelPost.exe] WinRE is installed
2025-08-14 06:34:49, Info [RelPost.exe] Exit WinReGetLogDirPath return error code: 0x0
2025-08-14 06:34:49, Info [RelPost.exe] Enter WinReSetTriggerFile
2025-08-14 06:34:49, Info [RelPost.exe] Parameters: DirName: \\?\GLOBALROOT\device\harddisk0\partition8\Recovery\Logs, fDelete: 1
2025-08-14 06:34:49, Warning [RelPost.exe] WinReSetTriggerFile failed to delete file (0x2) in file base\diagnosis\srt\reagent2\reagent\logfile.cpp line 237
2025-08-14 06:34:49, Info [RelPost.exe] Exit WinReSetTriggerFile return error code: 0x2
2025-08-14 06:42:44, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 06:42:44, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 06:42:44, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0
2025-08-14 06:42:59, Info [RelPost.exe] Enter WinReGetLogDirPath
2025-08-14 06:42:59, Info [RelPost.exe] Update enhanced config info is enabled.
2025-08-14 06:42:59, Info [RelPost.exe] WinRE is installed
2025-08-14 06:42:59, Info [RelPost.exe] Exit WinReGetLogDirPath return error code: 0x0
2025-08-14 06:42:59, Info [RelPost.exe] Enter WinReSetTriggerFile
2025-08-14 06:42:59, Info [RelPost.exe] Parameters: DirName: \\?\GLOBALROOT\device\harddisk0\partition8\Recovery\Logs, fDelete: 1
2025-08-14 06:42:59, Warning [RelPost.exe] WinReSetTriggerFile failed to delete file (0x2) in file base\diagnosis\srt\reagent2\reagent\logfile.cpp line 237
2025-08-14 06:42:59, Info [RelPost.exe] Exit WinReSetTriggerFile return error code: 0x2
2025-08-14 07:20:24, Info [svchost.exe] Enter WinReIsWimBootEnabled
2025-08-14 07:20:24, Info [svchost.exe] Parameters: pszWinDir: NULL
2025-08-14 07:20:24, Info [svchost.exe] Exit WinReIsWimBootEnabled returns 0 with last error: 0x0

PS C:\Windows\system32> Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setupact.log' -Tail 80 | Out-String
2025-08-14 07:20:23, Info SP Persist diagnostics data for new system for future uploading
2025-08-14 07:20:23, Info Persisting diagnostics data to C:\$WINDOWS.~BT\Sources\Diagnostics\diagnostics.dat
2025-08-14 07:20:23, Info Diagnostics data saved successfully
2025-08-14 07:20:23, Warning SP SPUninitializeNetwork: Not running in Windows PE; will not try to uninitialize network
2025-08-14 07:20:23, Info SP OPERATIONTRACK: CNewSystem Release
2025-08-14 07:20:23, Info MOUPG MoSetupPlatform: NewSystem object released!
2025-08-14 07:20:23, Info MOUPG MoSetupPlatform: Release Identifier -> [FinalizeExit]
2025-08-14 07:20:23, Info MOUPG MoSetupPlatform: Releasing Setup Platform object...
2025-08-14 07:20:23, Info SP Releasing the setup platform
2025-08-14 07:20:23, Info SP StopTelemetry: 1
2025-08-14 07:20:23, Info SP UploadTelemetryData: 0
2025-08-14 07:20:23, Info SP CorrelationVector: PMCtgrg9kkiaJpQw.31
2025-08-14 07:20:23, Info SP Try to merge diagnostics data from default new system data file
2025-08-14 07:20:23, Info Initializing diagnostics helper; data file = C:\$WINDOWS.~BT\Sources\Diagnostics\diagnostics.dat
2025-08-14 07:20:23, Info Found existing diagnostics data, attempting to load it.
2025-08-14 07:20:23, Warning Merging diagnostics data fails since not opted-in
2025-08-14 07:20:23, Info SP Finish merge diagnostics data
2025-08-14 07:20:23, Info SP Start uploading diagnostics data for setup platform
2025-08-14 07:20:23, Info SP Not opted-in to SQM. Diagnostics data will NOT be uploaded
2025-08-14 07:20:23, Info Key CollectTrace is not available.
2025-08-14 07:20:23, Info SP Upload telemetry data based on environment variable
2025-08-14 07:20:23, Info Copy telemetry file: source folder: C:\$WINDOWS.~BT\Sources\Panther, destination folder: C:\ProgramData\Microsoft\Diagnosis\ETLLogs
2025-08-14 07:20:23, Info Copy etl files: source: C:\$WINDOWS.~BT\Sources\Panther\DlTel-Merge.etl, destination: C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl
2025-08-14 07:20:23, Info pCopyTelemetryFile: Wrote CV PMCtgrg9kkiaJpQw.31 to ETL C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl:$ETLUNIQUECVDATA
2025-08-14 07:20:23, Info Diagtrack service is running
2025-08-14 07:20:23, Warning Failed to flush queues: 0x800704c6
2025-08-14 07:20:23, Warning Either AlwaysRestartDiagTrack was specified, or ForceUpload failed with error code=0x800704c6, restarting the diagtrack service to upload the etl
2025-08-14 07:20:24, Info Restart Diagtrack service successfully
2025-08-14 07:20:24, Info SP Closing Panther Logging
2025-08-14 07:20:24, Info MOUPG MoSetupPlatform: Setup Platform object released!
2025-08-14 07:20:24, Info MOUPG Finalize: Leaving Execute Method
2025-08-14 07:20:24, Warning MOUPG CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2004]
2025-08-14 07:20:24, Warning MOUPG CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2003]
2025-08-14 07:20:24, Warning MOUPG CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2001]
2025-08-14 07:20:24, Info MOUPG ProgressHandlerAction: Sending final progress message for action [0].
2025-08-14 07:20:24, Info MOUPG ProgressHandlerAction FinalUpdate: 0x0, 0x0 / 0x0, 0x0
2025-08-14 07:20:24, Info MOUPG ProgressHandlerAction: Sending final progress message for action [0].
2025-08-14 07:20:24, Info MOUPG ProgressHandlerAction FinalUpdate: 0x0, 0x0 / 0x0, 0x0
2025-08-14 07:20:24, Info MOUPG Signalling actions thread to shut down.
2025-08-14 07:20:24, Info MOUPG Waiting for actions thread to exit.
2025-08-14 07:20:24, Info MOUPG Actions thread has exited.
2025-08-14 07:20:24, Warning MOUPG CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2004]
2025-08-14 07:20:24, Warning MOUPG CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x2000]
2025-08-14 07:20:24, Warning MOUPG CSetupDiagnostics::ReportData - Not reporting WINDLP data point [0x3000]
2025-08-14 07:20:24, Info MOUPG DlpTask: Leaving Execute Method
2025-08-14 07:20:24, Info MOUPG SetupManager::ExecuteCustomScript: Type = [0x3]
2025-08-14 07:20:24, Info MOUPG SetupManager::ExecuteCustomScript: No scripts found. Finished type [0x3]
2025-08-14 07:20:24, Info MOUPG SetupNotify: Specifying extended data [0x50015] for error [0x800703F1].
2025-08-14 07:20:24, Info MOUPG CSetupUIManager: Showing error message
2025-08-14 07:20:24, Info MOUPG CInstallUI::ShowErrorMessage: Posted MSG_INSTALLUI_SWITCH_TO_ERROR_PAGE
2025-08-14 07:20:24, Info MOUPG CInstallUI::CInstallUIMessageWindow::SwitchToErrorPage
2025-08-14 07:20:24, Info MOUPG SetupHost: Reporting error event -> [0x800703F1, 0x50015]
2025-08-14 07:20:24, Info MOUPG CInstallUI::SwitchToErrorPage
2025-08-14 07:20:24, Warning MOUPG SetupNotify::ReportEvent - Report ID or Event Reporter not available.
2025-08-14 07:20:24, Info MOUPG SetupManager: FailureCount = [2]
2025-08-14 07:20:24, Info MOUPG SetupManager: Requesting cleanup level [0x2] from parent process.
2025-08-14 07:20:24, Info MOUPG Setup phase change: [SetupPhaseError] -> [SetupPhaseUnpack]
2025-08-14 07:20:24, Info MOUPG SetupManager: Deleting task: [Prepare]...
2025-08-14 07:20:24, Info MOUPG SetupManager: Deleting task: [Install]...
2025-08-14 07:20:24, Info MOUPG SetupManager: Deleting task: [Exit]...
2025-08-14 07:20:24, Info MOUPG SetupManager: Found unpack task! Restarting layout action...
2025-08-14 07:20:24, Info MOUPG CInstallUI::ShowMessageBox: Showing MessageBox
2025-08-14 07:20:24, Error MOUPG CSetupManager::Execute(295): Result = 0x800703F1
2025-08-14 07:20:24, Error MOUPG CSetupHost::Execute(433): Result = 0x800703F1
2025-08-14 07:20:24, Info MOUPG SetupHost: Using Diagnostic tool: ["C:\$WINDOWS.~BT\Sources\SetupDiag.exe" /Scenario:Upgrade /ZipLogs:False /Format:xml /Output:C:\Windows\logs\SetupDiag\SetupDiagResults.xml /RegPath:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupDiag\Results]
2025-08-14 07:20:24, Info MOUPG SetupHost: Diagnostic results location: [C:\Windows\logs\SetupDiag\SetupDiagResults.xml]
2025-08-14 07:20:24, Info MOUPG SetupHost: Diagnostic Analysis timeout value: [90000] ms
2025-08-14 07:20:24, Info MOUPG SetupHost: Diagnostic Analysis - START
2025-08-14 07:20:24, Info MOUPG CSetupDiagnostics: Tracing Data [TIME] -> [DiagnosticAnalysisStart]=[2025-08-14 07:20:24] [6845ac34-b116-420e-a53b-0cc845176d26][17d3dc84-d532-4050-ade9-ae0a9a38c6e0][][0x1]
2025-08-14 07:20:34, Info MOUPG SetupHost: Diagnostic tool execution result: [0x0]
2025-08-14 07:20:34, Info MOUPG CSetupDiagnostics: Tracing Data [DWORD] -> [DiagnosticAnalysisResult]=[0x0] [6845ac34-b116-420e-a53b-0cc845176d26][17d3dc84-d532-4050-ade9-ae0a9a38c6e0][][0x1]
2025-08-14 07:20:49, Info MOUPG CInstallUI::Quit: Posted MSG_INSTALLUI_FORCE_QUIT
2025-08-14 07:20:49, Info MOUPG CInstallUI::CInstallUIMessageWindow::ForceQuit
2025-08-14 07:20:49, Info MOUPG Force ending Message pump
2025-08-14 07:20:49, Info MOUPG CInstallUI::ExitInstance
2025-08-14 07:20:49, Info CONX Uninitializing compatibility provider wsc:setup:...
2025-08-14 07:20:49, Info CONX Uninitializing compatibility provider wsc:wica:...
2025-08-14 07:20:49, Info MOUPG SetupUI: Calling PowerClearRequest with type [0x1]...
2025-08-14 07:20:49, Info MOUPG SetupUI: Power request cleared!
2025-08-14 07:20:49, Info MOUPG **************** SetupHost Logging End ****************

PS C:\Windows\system32>
 

Thanks — the logs you pasted are helpful.
What the logs show (short)
  • Setup failed during finalize/unpack with error 0x800703F1. The installer ran SetupDiag and returned no helpful automatic diagnostic (DiagnosticAnalysisResult=0x0), so we need to dig into the failure lines and try a couple of usual culprits. From experience 0x800703F1 during upgrade often points to one of:
    • a driver/service or third‑party system tool blocking setup (VPN, backup, snapshot, AOMEI, anti‑virus),
    • a disk / file access problem during the unpack/finalize phase (I/O / permissions),
    • or a corrupt installer source (bad ISO) or interference while Setup tried to write files.
Immediate next steps — do these in order (I’ll stay with you)
1) Confirm you’ve done Clean Boot and removed blockers
  • In msconfig / Services: you said you’re doing this now — make sure you:
    • Hide Microsoft services → Disable all non‑Microsoft services.
    • In Task Manager → Startup → Disable all items.
    • Uninstall (not just disable) VPN/Surfshark, AOMEI Backupper, and any third‑party AV/security/backup tools before retrying. These are common causes.
    • Disconnect all non‑essential USB devices (external drives, dongles, printers, USB hubs).
Tell me when you’ve uninstalled Surfshark and AOMEI and disabled AV.
2) Run a quick disk & file health check (copy/paste these commands, run as Admin)
  • chkdsk C: /f (Schedule if requested, then reboot so it runs.)
  • sfc /scannow
    Tell me if chkdsk found/fixed anything and if SFC reported issues.
3) Recreate the installation media / use a fresh ISO
  • Download a fresh Windows 10 22H2 ISO from Microsoft (Media Creation Tool → Create installation media → choose ISO). Corrupt ISO/source will fail at the unpack/finalize stage.
  • Mount the ISO in Explorer on the target machine (right‑click → Mount), then right‑click setup.exe → Run as administrator.
  • On prompts choose Keep personal files and apps. For this attempt try selecting “Download updates” off (if offered) — sometimes network update downloads cause a failure path; you can try both ways later.
4) If the upgrade fails again: collect the precise failure logs I need
You already gave the UnattendGC and tail of setupact. Now please paste the tails of setuperr.log and any Rollback logs. Run these exact commands in an elevated PowerShell and paste the outputs here:
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setuperr.log' -Tail 300 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Rollback\setuperr.log' -Tail 300 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Rollback\setupact.log' -Tail 400 | Out-String
Also paste SetupDiag results (the installer already ran it) — run and paste:
Get-Content 'C:\Windows\logs\SetupDiag\SetupDiagResults.xml' -Raw | Out-String
Those files usually contain the one or two lines that point to a specific driver, file, or plugin that failed. Post them and I’ll parse them line‑by‑line.
5) If logs point to a specific driver or device
  • I’ll give exact uninstall commands (device driver removal / registry Enum key removal) or a small WinRE registry fix depending on what the logs show.
6) Practical workaround (if you want to avoid more retries)
  • Boot Windows normally and use a USB network adapter (USB-Ethernet or Wi‑Fi dongle). Get Windows Update and the Realtek driver installed that way. Often once Windows Update and OEM drivers are current the internal NIC will install correctly. I still prefer fixing the in‑place upgrade problem, but that’s a quick way to get a working network.
Why I’m asking for those specific logs
  • setupact.log gave us the generic 0x800703F1 and that SetupDiag ran, but not the root cause. The setuperr.log and rollback setuperr/setupact almost always show the exact plugin, driver, or file that failed to migrate or write. Once I see those lines I can give the targeted fix (remove driver X, delete registry node Y, or restore a file).
If you want to retry immediately
  • Do the Clean Boot + uninstall Surfshark/AOMEI + disconnect USBs + run setup from a freshly downloaded ISO (run as admin). If it fails again, paste the outputs of the three Get-Content commands above and the SetupDiagResults.xml and I’ll decode them and give the next commands.
I’m standing by — paste those logs when ready and we’ll get this nailed down.
 

I did uninstall Surfshark and AOMEI and disabled AV.

************

PS C:\Windows\system32> sfc /scannow

Beginning system scan. This process will take some time.

Beginning verification phase of system scan.
Verification 100% complete.

Windows Resource Protection found corrupt files but was unable to fix some of them.
For online repairs, details are included in the CBS log file located at
windir\Logs\CBS\CBS.log. For example C:\Windows\Logs\CBS\CBS.log. For offline
repairs, details are included in the log file provided by the /OFFLOGFILE flag.

****************
 

Attachments

Thanks — the logs you pasted make the failure clear: Setup aborted during the final/unpack phase with error 0x800703F1 (Setup reported Result = 0x800703F1), and SFC now reports “Windows Resource Protection found corrupt files but was unable to fix some of them.” That combo strongly suggests the component store / servicing area has corruption that the installer can’t write around, so we need to repair the component store first and then re-run the upgrade. (This is a common workflow — DISM → SFC → retry upgrade.)
Below is a safe, ordered plan with exact commands. Follow steps 1–6 in order and paste back outputs for the commands I ask for. I’ll stay on the thread and interpret anything you paste.
Quick recap of what we’ll do
  • Repair the Windows component store using a known-good source (your Windows 10 ISO).
  • Re-run SFC to fix remaining protected files.
  • Re-attempt the in-place upgrade from that same mounted ISO (clean boot + no USB devices).
  • If it still fails, gather the specific SetupDiag and CBS excerpts so we can target the exact failing component.
Step 0 — preparations (do these now)
  • Keep your Clonezilla image — you have it (good).
  • Plug AC in. Remove all non-essential USB devices.
  • Make sure you are running as Administrator for the commands below.
Step 1 — mount a fresh Windows 10 22H2 ISO (or recreate via Media Creation Tool)
  • On another PC, download the Windows 10 22H2 ISO using Microsoft’s Media Creation Tool (matching your Windows 10 Home x64 build 19045). If you already have the ISO, copy it to this laptop.
  • On the laptop: Right‑click the ISO → Mount. Note the drive letter Windows assigns (e.g., X:). I’ll assume X: below — if different, substitute your letter.
Step 2 — check whether the ISO contains install.wim or install.esd
Run (Admin PowerShell / Admin CMD):
  • If you mounted to X: then:
    dism /Get-WimInfo /WimFile:X:\sources\install.wim
If that says file not found, check for install.esd:
dir X:\sources\install.*
Tell me which one you have (install.wim or install.esd) and, if install.wim, the index number shown by Get-WimInfo (we need the index for the DISM source).
Step 3 — repair the component store using the mounted ISO as the source
Use the appropriate command depending on whether you have install.wim or install.esd:
  • If install.wim and index is 1 (adjust index if different):
    dism /online /cleanup-image /restorehealth /source:wim:X:\sources\install.wim:1 /limitaccess
  • If install.esd:
    dism /online /cleanup-image /restorehealth /source:esd:X:\sources\install.esd:1 /limitaccess
Notes:
  • /limitaccess prevents DISM from using Windows Update — we force it to use the ISO contents.
  • Let DISM run to completion (may take 10–30 minutes). If DISM reports it repaired components, reboot.
Step 4 — re-run SFC and capture the CBS details if SFC still finds problems
Run (Admin CMD / PowerShell):
sfc /scannow
If SFC still reports “found corrupt files but was unable to fix some of them” do this to produce a smaller, focused log excerpt and paste it here:
findstr /c:"[SR]" %windir%\Logs\CBS\CBS.log > "%userprofile%\Desktop\sfcdetails.txt"
notepad "%userprofile%\Desktop\sfcdetails.txt"
Copy the bottom ~100 lines from sfcdetails.txt and paste them here. That will show the specific files SFC could not fix.
Step 5 — run SetupDiag and post results if upgrade still fails
You already saw Setup ran during the failed upgrade; it writes C:\Windows\logs\SetupDiag\SetupDiagResults.xml. If the upgrade fails again, paste that file (or run now and paste):
type "C:\Windows\logs\SetupDiag\SetupDiagResults.xml" | more
Paste the entire XML (or at least the <Fault> / <Analysis> sections) here — SetupDiag usually points to the specific driver / plugin / component that failed.
Step 6 — retry the in‑place upgrade with clean‑boot and the ISO you mounted
  • Do a Clean Boot (msconfig):
    • Run msconfig → Services → check “Hide Microsoft services” → Disable all.
    • Startup → Open Task Manager → Disable all startup items → OK → Reboot.
  • Uninstall Surfshark, AOMEI (you did), and any third‑party AV (completely uninstall if possible). Reboot.
  • Right‑click X:\setup.exe → Run as administrator → choose Keep personal files and apps → proceed.
  • If it fails again, immediately paste the last 200 lines of the setuperr.log and the last 400 of setupact.log:
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setuperr.log' -Tail 200 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setupact.log' -Tail 400 | Out-String
(You already pasted setupact tail earlier; I still need setuperr tail and the Rollback setuperr if present.)
Optional extra checks (if DISM fails)
  • If DISM returns errors about unable to locate source files, try mounting the ISO to a different drive letter or re-downloading the ISO (it may be corrupted).
  • You can also specify the Source path to \sources\sxs from the ISO (rare for Windows 10, but possible):
    dism /online /cleanup-image /restorehealth /source:WIM:X:\sources\install.wim:1 /limitaccess /scratchdir:C:\Temp
Disk & SMART check (to rule out hardware)
  • Run CHKDSK if you haven’t recently (Admin CMD):
    chkdsk C: /f
  • Quick SMART status:
    wmic diskdrive get model,status,size
If CHKDSK reports I/O errors or WMIC shows a disk problem, stop and report that — hardware issues will block upgrades and SFC.
Why these steps
  • Your setup error 0x800703F1 + SFC reporting unrepaired files is the classic signature of servicing/component-store corruption; repairing the component store with DISM using a known-good install.wim/esd is the recommended Microsoft path before retrying an upgrade. Community threads and many forum posts advise DISM → SFC → Retry, which resolves this class of failures most of the time.
If you want me to
  • I can fetch the Microsoft Media Creation Tool link for you and verify the ISO is the correct 22H2 build (I can do that now).
  • Or I can walk you through the DISM command interactively — say “Run DISM” and tell me the ISO drive letter your machine assigned and whether it has install.wim or install.esd (Step 2).
Next action for you right now
1) Mount the ISO (or make one with Media Creation Tool) and tell me the assigned drive letter (or run the Get-WimInfo command and paste output).
2) Run the DISM restorehealth command using the proper WIM/ESD syntax (I’ll give it exactly once I know X: and whether install.wim or install.esd).
3) Re-run sfc /scannow and, if it still reports unfixable files, run the findstr command to create sfcdetails.txt and paste the last ~50–100 lines here.
You’re on the right path — once the component store is repaired we almost always succeed with the in‑place upgrade and the Realtek driver install will be possible afterward. Tell me the ISO drive letter (or paste the output of dism /Get-WimInfo if you ran it) and I’ll give the exact DISM line to paste.
 

2025-08-14 08:17:40, Info CSI 000001d2 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:40, Info CSI 000001d3 [SR] Verify complete
2025-08-14 08:17:41, Info CSI 000001d4 [SR] Verifying 100 components
2025-08-14 08:17:41, Info CSI 000001d5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:41, Info CSI 000001d6 [SR] Verify complete
2025-08-14 08:17:42, Info CSI 000001d7 [SR] Verifying 100 components
2025-08-14 08:17:42, Info CSI 000001d8 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:42, Info CSI 000001d9 [SR] Verify complete
2025-08-14 08:17:43, Info CSI 000001da [SR] Verifying 100 components
2025-08-14 08:17:43, Info CSI 000001db [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:44, Info CSI 000001e0 [SR] Verify complete
2025-08-14 08:17:44, Info CSI 000001e1 [SR] Verifying 100 components
2025-08-14 08:17:44, Info CSI 000001e2 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:45, Info CSI 000001e3 [SR] Verify complete
2025-08-14 08:17:45, Info CSI 000001e4 [SR] Verifying 100 components
2025-08-14 08:17:45, Info CSI 000001e5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:46, Info CSI 000001e6 [SR] Verify complete
2025-08-14 08:17:46, Info CSI 000001e7 [SR] Verifying 100 components
2025-08-14 08:17:46, Info CSI 000001e8 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:47, Info CSI 000001e9 [SR] Verify complete
2025-08-14 08:17:47, Info CSI 000001ea [SR] Verifying 100 components
2025-08-14 08:17:47, Info CSI 000001eb [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:48, Info CSI 000001ec [SR] Verify complete
2025-08-14 08:17:48, Info CSI 000001ed [SR] Verifying 100 components
2025-08-14 08:17:48, Info CSI 000001ee [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:50, Info CSI 000001f0 [SR] Verify complete
2025-08-14 08:17:50, Info CSI 000001f1 [SR] Verifying 100 components
2025-08-14 08:17:50, Info CSI 000001f2 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:51, Info CSI 000001f3 [SR] Verify complete
2025-08-14 08:17:51, Info CSI 000001f4 [SR] Verifying 100 components
2025-08-14 08:17:51, Info CSI 000001f5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:52, Info CSI 000001f6 [SR] Verify complete
2025-08-14 08:17:52, Info CSI 000001f7 [SR] Verifying 100 components
2025-08-14 08:17:52, Info CSI 000001f8 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:54, Info CSI 000001f9 [SR] Verify complete
2025-08-14 08:17:54, Info CSI 000001fa [SR] Verifying 100 components
2025-08-14 08:17:54, Info CSI 000001fb [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:55, Info CSI 000001fc [SR] Verify complete
2025-08-14 08:17:55, Info CSI 000001fd [SR] Verifying 100 components
2025-08-14 08:17:55, Info CSI 000001fe [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:56, Info CSI 000001ff [SR] Verify complete
2025-08-14 08:17:56, Info CSI 00000200 [SR] Verifying 100 components
2025-08-14 08:17:56, Info CSI 00000201 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:57, Info CSI 00000202 [SR] Verify complete
2025-08-14 08:17:57, Info CSI 00000203 [SR] Verifying 100 components
2025-08-14 08:17:57, Info CSI 00000204 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:58, Info CSI 00000205 [SR] Verify complete
2025-08-14 08:17:58, Info CSI 00000206 [SR] Verifying 100 components
2025-08-14 08:17:58, Info CSI 00000207 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:58, Info CSI 00000208 [SR] Verify complete
2025-08-14 08:17:58, Info CSI 00000209 [SR] Verifying 100 components
2025-08-14 08:17:58, Info CSI 0000020a [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:59, Info CSI 0000020b [SR] Verify complete
2025-08-14 08:17:59, Info CSI 0000020c [SR] Verifying 100 components
2025-08-14 08:17:59, Info CSI 0000020d [SR] Beginning Verify and Repair transaction
2025-08-14 08:18:00, Info CSI 0000020f [SR] Verify complete
2025-08-14 08:18:01, Info CSI 00000210 [SR] Verifying 77 components
2025-08-14 08:18:01, Info CSI 00000211 [SR] Beginning Verify and Repair transaction
2025-08-14 08:18:01, Info CSI 00000212 [SR] Verify complete
2025-08-14 08:18:01, Info CSI 00000213 [SR] Repairing 0 components
2025-08-14 08:18:01, Info CSI 00000214 [SR] Beginning Verify and Repair transaction
2025-08-14 08:18:01, Info CSI 00000215 [SR] Repair complete
 

Good — thanks for the SFC snippet. Next we'll run DISM using a clean Windows 10 22H2 source to repair the component store, then re-run SFC, then retry the in‑place upgrade.
Do these steps (copy/paste each command). Tell me the drive letter for the mounted ISO when asked (or say “I need the ISO link” and I’ll paste the official Microsoft download link).
1) Show which SFC entries were unrepairable (quick)
In an elevated PowerShell / CMD run:
findstr /c:"[SR]" %windir%\Logs\CBS\CBS.log > C:\Users\Public\sfcreport.txt
Get-Content C:\Users\Public\sfcreport.txt -Tail 120 | Out-String
Paste that output if you want me to confirm the exact files SFC couldn’t fix. (Optional — DISM will usually resolve these.)
2) Mount a fresh Windows 10 22H2 ISO (if not already)
  • If you already mounted the ISO, note its drive letter (for example D:). If you need the ISO, say “Get ISO link” and I’ll give you the Microsoft Media Creation Tool / ISO link.
Check which file is in the sources folder:
dir X:\sources\install.* (replace X: with the ISO drive letter)
If you see install.wim use the wim command below; if install.esd use the esd command.
3) Run DISM with the ISO as source (exact command — replace X: with your ISO drive)
If install.wim is present:
DISM /Online /Cleanup-Image /RestoreHealth /Source:wim:X:\sources\install.wim:1 /LimitAccess
If install.esd is present:
DISM /Online /Cleanup-Image /RestoreHealth /Source:esd:X:\sources\install.esd:1 /LimitAccess
Let DISM complete (may take 10–30 minutes). When it finishes, paste the final lines of its output (it will say whether the restore operation completed successfully).
If DISM reports source files not found or fails, run without /LimitAccess (lets DISM use Windows Update) or re-download the ISO — tell me the DISM error and I’ll advise the fallback.
4) Re-run SFC
After DISM finishes, run:
sfc /scannow
When it finishes, paste the last 6–10 lines of the output (or tell me if it reports “Windows Resource Protection did not find any integrity violations” or “found and repaired” etc).
5) Free space & quick sanity check
Ensure at least ~30 GB free on C:. Run:
wmic logicaldisk get caption,filesystem,freespace,size
If free space <20 GB, free some space before retrying the upgrade.
6) Retry the in‑place upgrade
  • Mount the same fresh ISO and run setup.exe as Administrator. Choose “Keep personal files and apps”.
  • If it fails again, immediately paste the tail of these logs (run as Admin):
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setuperr.log' -Tail 300 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setupact.log' -Tail 400 | Out-String
Get-Content 'C:\Windows\logs\SetupDiag\SetupDiagResults.xml' -Raw | Out-String
I’ll parse them and give the targeted fix (most likely: an offending driver/service we’ll remove or a file/permission to restore).
If you want the Microsoft Windows 10 22H2 ISO link now, say “Get ISO link” and I’ll post it. Which step do you want to run now — run DISM (tell me your ISO drive letter) or get the ISO link?
 

PS C:\Windows\system32> findstr /c:"[SR]" C:\Windows\Logs\CBS\CBS.log > "D:\temp\sfcdetails.txt"
PS C:\Windows\system32> findstr /c:"[SR]" C:\Windows\Logs\CBS\CBS.log > D:\Temp\sfcreport.txt
PS C:\Windows\system32> Get-Content D:\Temp\sfcreport.txt -Tail 120 | Out-String
2025-08-14 08:17:20, Info CSI 00000191 [SR] Verifying 100 components
2025-08-14 08:17:20, Info CSI 00000192 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:21, Info CSI 00000193 [SR] Verify complete
2025-08-14 08:17:21, Info CSI 00000194 [SR] Verifying 100 components
2025-08-14 08:17:21, Info CSI 00000195 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:22, Info CSI 00000196 [SR] Verify complete
2025-08-14 08:17:22, Info CSI 00000197 [SR] Verifying 100 components
2025-08-14 08:17:22, Info CSI 00000198 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:23, Info CSI 00000199 [SR] Verify complete
2025-08-14 08:17:23, Info CSI 0000019a [SR] Verifying 100 components
2025-08-14 08:17:23, Info CSI 0000019b [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:24, Info CSI 0000019c [SR] Verify complete
2025-08-14 08:17:24, Info CSI 0000019d [SR] Verifying 100 components
2025-08-14 08:17:24, Info CSI 0000019e [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:25, Info CSI 0000019f [SR] Verify complete
2025-08-14 08:17:25, Info CSI 000001a0 [SR] Verifying 100 components
2025-08-14 08:17:25, Info CSI 000001a1 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:26, Info CSI 000001a3 [SR] Verify complete
2025-08-14 08:17:26, Info CSI 000001a4 [SR] Verifying 100 components
2025-08-14 08:17:26, Info CSI 000001a5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:27, Info CSI 000001a9 [SR] Verify complete
2025-08-14 08:17:27, Info CSI 000001aa [SR] Verifying 100 components
2025-08-14 08:17:27, Info CSI 000001ab [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:28, Info CSI 000001ac [SR] Verify complete
2025-08-14 08:17:28, Info CSI 000001ad [SR] Verifying 100 components
2025-08-14 08:17:28, Info CSI 000001ae [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:28, Info CSI 000001af [SR] Verify complete
2025-08-14 08:17:29, Info CSI 000001b0 [SR] Verifying 100 components
2025-08-14 08:17:29, Info CSI 000001b1 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:29, Info CSI 000001b2 [SR] Verify complete
2025-08-14 08:17:29, Info CSI 000001b3 [SR] Verifying 100 components
2025-08-14 08:17:29, Info CSI 000001b4 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:29, Info CSI 000001b5 [SR] Verify complete
2025-08-14 08:17:30, Info CSI 000001b6 [SR] Verifying 100 components
2025-08-14 08:17:30, Info CSI 000001b7 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:31, Info CSI 000001ba [SR] Verify complete
2025-08-14 08:17:32, Info CSI 000001bb [SR] Verifying 100 components
2025-08-14 08:17:32, Info CSI 000001bc [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:32, Info CSI 000001bd [SR] Verify complete
2025-08-14 08:17:32, Info CSI 000001be [SR] Verifying 100 components
2025-08-14 08:17:32, Info CSI 000001bf [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:33, Info CSI 000001c0 [SR] Verify complete
2025-08-14 08:17:33, Info CSI 000001c1 [SR] Verifying 100 components
2025-08-14 08:17:33, Info CSI 000001c2 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:35, Info CSI 000001c3 [SR] Verify complete
2025-08-14 08:17:35, Info CSI 000001c4 [SR] Verifying 100 components
2025-08-14 08:17:35, Info CSI 000001c5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:36, Info CSI 000001c6 [SR] Verify complete
2025-08-14 08:17:36, Info CSI 000001c7 [SR] Verifying 100 components
2025-08-14 08:17:36, Info CSI 000001c8 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:37, Info CSI 000001c9 [SR] Verify complete
2025-08-14 08:17:37, Info CSI 000001ca [SR] Verifying 100 components
2025-08-14 08:17:37, Info CSI 000001cb [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:39, Info CSI 000001cd [SR] Verify complete
2025-08-14 08:17:39, Info CSI 000001ce [SR] Verifying 100 components
2025-08-14 08:17:39, Info CSI 000001cf [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:40, Info CSI 000001d0 [SR] Verify complete
2025-08-14 08:17:40, Info CSI 000001d1 [SR] Verifying 100 components
2025-08-14 08:17:40, Info CSI 000001d2 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:40, Info CSI 000001d3 [SR] Verify complete
2025-08-14 08:17:41, Info CSI 000001d4 [SR] Verifying 100 components
2025-08-14 08:17:41, Info CSI 000001d5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:41, Info CSI 000001d6 [SR] Verify complete
2025-08-14 08:17:42, Info CSI 000001d7 [SR] Verifying 100 components
2025-08-14 08:17:42, Info CSI 000001d8 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:42, Info CSI 000001d9 [SR] Verify complete
2025-08-14 08:17:43, Info CSI 000001da [SR] Verifying 100 components
2025-08-14 08:17:43, Info CSI 000001db [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:44, Info CSI 000001e0 [SR] Verify complete
2025-08-14 08:17:44, Info CSI 000001e1 [SR] Verifying 100 components
2025-08-14 08:17:44, Info CSI 000001e2 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:45, Info CSI 000001e3 [SR] Verify complete
2025-08-14 08:17:45, Info CSI 000001e4 [SR] Verifying 100 components
2025-08-14 08:17:45, Info CSI 000001e5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:46, Info CSI 000001e6 [SR] Verify complete
2025-08-14 08:17:46, Info CSI 000001e7 [SR] Verifying 100 components
2025-08-14 08:17:46, Info CSI 000001e8 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:47, Info CSI 000001e9 [SR] Verify complete
2025-08-14 08:17:47, Info CSI 000001ea [SR] Verifying 100 components
2025-08-14 08:17:47, Info CSI 000001eb [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:48, Info CSI 000001ec [SR] Verify complete
2025-08-14 08:17:48, Info CSI 000001ed [SR] Verifying 100 components
2025-08-14 08:17:48, Info CSI 000001ee [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:50, Info CSI 000001f0 [SR] Verify complete
2025-08-14 08:17:50, Info CSI 000001f1 [SR] Verifying 100 components
2025-08-14 08:17:50, Info CSI 000001f2 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:51, Info CSI 000001f3 [SR] Verify complete
2025-08-14 08:17:51, Info CSI 000001f4 [SR] Verifying 100 components
2025-08-14 08:17:51, Info CSI 000001f5 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:52, Info CSI 000001f6 [SR] Verify complete
2025-08-14 08:17:52, Info CSI 000001f7 [SR] Verifying 100 components
2025-08-14 08:17:52, Info CSI 000001f8 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:54, Info CSI 000001f9 [SR] Verify complete
2025-08-14 08:17:54, Info CSI 000001fa [SR] Verifying 100 components
2025-08-14 08:17:54, Info CSI 000001fb [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:55, Info CSI 000001fc [SR] Verify complete
2025-08-14 08:17:55, Info CSI 000001fd [SR] Verifying 100 components
2025-08-14 08:17:55, Info CSI 000001fe [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:56, Info CSI 000001ff [SR] Verify complete
2025-08-14 08:17:56, Info CSI 00000200 [SR] Verifying 100 components
2025-08-14 08:17:56, Info CSI 00000201 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:57, Info CSI 00000202 [SR] Verify complete
2025-08-14 08:17:57, Info CSI 00000203 [SR] Verifying 100 components
2025-08-14 08:17:57, Info CSI 00000204 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:58, Info CSI 00000205 [SR] Verify complete
2025-08-14 08:17:58, Info CSI 00000206 [SR] Verifying 100 components
2025-08-14 08:17:58, Info CSI 00000207 [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:58, Info CSI 00000208 [SR] Verify complete
2025-08-14 08:17:58, Info CSI 00000209 [SR] Verifying 100 components
2025-08-14 08:17:58, Info CSI 0000020a [SR] Beginning Verify and Repair transaction
2025-08-14 08:17:59, Info CSI 0000020b [SR] Verify complete
2025-08-14 08:17:59, Info CSI 0000020c [SR] Verifying 100 components
2025-08-14 08:17:59, Info CSI 0000020d [SR] Beginning Verify and Repair transaction
2025-08-14 08:18:00, Info CSI 0000020f [SR] Verify complete
2025-08-14 08:18:01, Info CSI 00000210 [SR] Verifying 77 components
2025-08-14 08:18:01, Info CSI 00000211 [SR] Beginning Verify and Repair transaction
2025-08-14 08:18:01, Info CSI 00000212 [SR] Verify complete
2025-08-14 08:18:01, Info CSI 00000213 [SR] Repairing 0 components
2025-08-14 08:18:01, Info CSI 00000214 [SR] Beginning Verify and Repair transaction
2025-08-14 08:18:01, Info CSI 00000215 [SR] Repair complete

PS C:\Windows\system32>
 

Good — your SFC excerpt looks like it ran verification and reported “Repairing 0 components / Repair complete” for the portion you pasted, but earlier SFC did say some items couldn’t be fixed. Next step is a DISM repair using a clean Windows 10 22H2 source, then re-run SFC and retry the upgrade.
Tell me first:
  • Do you already have the Windows 10 22H2 ISO mounted? If yes, what drive letter was assigned (e.g. D:)?
  • If you don’t have it, do you want the official Microsoft Media Creation Tool / ISO link now?
If you already have the ISO mounted, run these (copy/paste exactly in an elevated Command Prompt or PowerShell):
1) Check which source file is present (replace X: with the ISO drive letter):
dir X:\sources\install.*
If the output shows install.wim use the WIM DISM command below. If it shows install.esd use the ESD command.
2) Run DISM pointing to the ISO source (replace X: with your ISO drive letter)
  • If install.wim is present:
    DISM /Online /Cleanup-Image /RestoreHealth /Source:wim:X:\sources\install.wim:1 /LimitAccess
  • If install.esd is present:
    DISM /Online /Cleanup-Image /RestoreHealth /Source:esd:X:\sources\install.esd:1 /LimitAccess
Let DISM run to completion (may take 10–30 minutes). When it finishes, copy/paste the final lines of DISM output here (especially the summary line — e.g. “The restore operation completed successfully” or any error code).
3) Re-run SFC:
sfc /scannow
Paste the last 8–12 lines of the SFC output. Ideally it will say either “Windows Resource Protection did not find any integrity violations” or “found and repaired”.
4) Confirm free space on C: (required before retry)
wmic logicaldisk get caption,filesystem,freespace,size
Make sure you have at least ~30 GB free. If less than ~20 GB, free space before retrying.
5) Retry the in‑place upgrade
  • Mount the same fresh ISO (right‑click → Mount) and run setup.exe as Administrator.
  • Choose Keep personal files and apps.
  • If it fails again, immediately paste these logs (tail outputs):
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setuperr.log' -Tail 300 | Out-String
Get-Content 'C:\$WINDOWS.~BT\Sources\Panther\setupact.log' -Tail 400 | Out-String
Get-Content 'C:\Windows\logs\SetupDiag\SetupDiagResults.xml' -Raw | Out-String
If you don’t have the ISO and want the official download, say “Get ISO link” and I’ll paste Microsoft’s Media Creation Tool / ISO instructions and the direct download link.
If DISM fails with a particular error (e.g. 0x800f081f or “source files not found”), tell me the error text and I’ll give the fallback steps (use Windows Update as source, or extract install.wim from another image, or use the Install.esd alternative).
Which do you want to do now — run DISM (tell me the ISO drive letter), or get the ISO link so you can download/mount a fresh copy?
 

2025-08-14 08:49:43, Info CSI 000001fe [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:43, Info CSI 000001ff [SR] Verify complete
2025-08-14 08:49:43, Info CSI 00000200 [SR] Verifying 100 components
2025-08-14 08:49:43, Info CSI 00000201 [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:44, Info CSI 00000202 [SR] Verify complete
2025-08-14 08:49:44, Info CSI 00000203 [SR] Verifying 100 components
2025-08-14 08:49:44, Info CSI 00000204 [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:45, Info CSI 00000205 [SR] Verify complete
2025-08-14 08:49:45, Info CSI 00000206 [SR] Verifying 100 components
2025-08-14 08:49:45, Info CSI 00000207 [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:46, Info CSI 00000208 [SR] Verify complete
2025-08-14 08:49:46, Info CSI 00000209 [SR] Verifying 100 components
2025-08-14 08:49:46, Info CSI 0000020a [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:46, Info CSI 0000020b [SR] Verify complete
2025-08-14 08:49:46, Info CSI 0000020c [SR] Verifying 100 components
2025-08-14 08:49:46, Info CSI 0000020d [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:47, Info CSI 0000020e [SR] Verify complete
2025-08-14 08:49:47, Info CSI 0000020f [SR] Verifying 100 components
2025-08-14 08:49:47, Info CSI 00000210 [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:48, Info CSI 00000211 CSIPERF - FilePI Queue 225ms
2025-08-14 08:49:48, Info CSI 00000212 [SR] Verify complete
2025-08-14 08:49:48, Info CSI 00000213 [SR] Verifying 77 components
2025-08-14 08:49:48, Info CSI 00000214 [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:48, Info CSI 00000215 [SR] Verify complete
2025-08-14 08:49:48, Info CSI 00000216 [SR] Repairing 0 components
2025-08-14 08:49:48, Info CSI 00000217 [SR] Beginning Verify and Repair transaction
2025-08-14 08:49:48, Info CSI 00000218 [SR] Repair complete
2025-08-14 08:51:50, Info CBS Trusted Installer is shutting down because: SHUTDOWN_REASON_AUTOSTOP
2025-08-14 08:51:50, Info CBS TiWorker signaled for shutdown, going to exit.
2025-08-14 08:51:50, Info CBS Deleting the contents of directory: \\?\C:\Windows\CbsTemp
2025-08-14 08:51:50, Info CBS Deletion of: \\?\C:\Windows\CbsTemp successful
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: ExecutionEngineFinalize
2025-08-14 08:51:50, Info CBS Execution Engine Finalize
2025-08-14 08:51:50, Info CBS Execution Engine Finalize
2025-08-14 08:51:50, Info CBS Lock: Lock removed: TiWorkerClassFactory, level: 30, total lock:3
2025-08-14 08:51:50, Info CBS Lock: Lock removed: CCbsWorker, level: 5, total lock:2
2025-08-14 08:51:50, Info CBS Ending the TiWorker main loop.
2025-08-14 08:51:50, Info CBS Starting TiWorker finalization.
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: ExecutionEngineFinalize
2025-08-14 08:51:50, Info CBS CBS Engine already deactivated
2025-08-14 08:51:50, Info CBS CBS Engine already deactivated
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: ComponentAnalyzerFinalize
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: PackageTrackerFinalize
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: CoreResourcesUnload
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: SessionManagerFinalize
2025-08-14 08:51:50, Info CBS Lock: Lock removed: CSIInventoryCriticalSection, level: 64, total lock:10
2025-08-14 08:51:50, Info CBS Lock: Lock removed: CCbsSessionManager, level: 11, total lock:9
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: CapabilityManagerFinalize
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: PublicObjectMonitorFinalize
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: Enter vCoreInitializeLock
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: WcpUnload
2025-08-14 08:51:50, Info CSI 00000219 Direct SIL provider: Number of files opened: 239855.
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: DrupUnload
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: CfgMgr32Unload
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: DpxUnload
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: SrUnload
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: CbsEsdUnload
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: CbsTraceInfoUninitialize
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: CbsEventUnregister
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: AppContainerUnload
2025-08-14 08:51:50, Info CBS CbsCoreFinalize: WdsUnload, logging from cbscore will end.
2025-08-14 08:51:50, Info CBS Ending TiWorker finalization.
2025-08-14 08:51:50, Info CBS Ending the TrustedInstaller main loop.
2025-08-14 08:51:50, Info CBS Starting TrustedInstaller finalization.
2025-08-14 08:51:50, Info CBS Winlogon: Stopping notify server
2025-08-14 08:51:50, Info CBS Winlogon: Unloading SysNotify DLL
2025-08-14 08:51:50, Info CBS Lock: Lock removed: WinlogonNotifyLock, level: 8, total lock:6
2025-08-14 08:51:50, Info CBS Ending TrustedInstaller finalization.
 

Back
Top