Scenario (i.e., this was my situation)
Solution
Re-register the winre image with:
Additional information:
reagentc /info (ran from an elevated command prompt) shows:
Partition4 is my C:, i.e. my system partition.
bcdedit (ran from an elevated command prompt) shows recoverysequence {4a081ca8-71be-11e6-80cd-eca86b8ec766} (under windows boot loader):
I got this problem after I've accidentally removed all administrator accounts from netplwiz = control userpasswords2 (user accounts advanced menu?) some weeks/months ago.
I consider that a BUG in windows: we shouldn't be able to remove all administrator accounts!!!
I can't remember how I solved that problem; that's why I'm posting this: to remember how I did it, in the hope it could be useful for someone else.
- You are able to log in normally to windows 10 (with your own account, set as standard or as administrator, and with the usually hidden SuperAdministrator account)
- Safe mode and safe mode with networking are working
- Safe mode with command prompt shows no administrator accounts and this message: You need to sign in as an administrator to continue, but there aren't any administrator accounts on this PC..
Hence you aren't able to use the safe mode with command prompt. - Your C:\Recovery\WindowsRE folder contains the winre.wim (windows image) file necessary to get the windows advanced startup settings
Solution
Re-register the winre image with:
reagentc /disable
reagentc /enable
Additional information:
reagentc /info (ran from an elevated command prompt) shows:
Read More:
Code:
Windows Recovery Environment (Windows RE) and system reset configuration
Information:
Windows RE status: Enabled
Windows RE location: \\?\GLOBALROOT\device\harddisk0\partition4\Recovery\WindowsRE
Boot Configuration Data (BCD) identifier: [B]4a081ca8-71be-11e6-80cd-eca86b8ec766[/B]
Recovery image location:
Recovery image index: 0
Custom image location:
Custom image index: 0
REAGENTC.EXE: Operation Successful.
bcdedit (ran from an elevated command prompt) shows recoverysequence {4a081ca8-71be-11e6-80cd-eca86b8ec766} (under windows boot loader):
Read More:
Code:
C:\WINDOWS\system32>bcdedit
Windows Boot Manager
--------------------
identifier {bootmgr}
device partition=\Device\HarddiskVolume2
path \EFI\Microsoft\Boot\bootmgfw.efi
description Windows Boot Manager
locale it-IT
inherit {globalsettings}
integrityservices Enable
default {current}
resumeobject {5d5a201e-d643-11e4-a71c-9001aae18364}
displayorder {current}
toolsdisplayorder {memdiag}
timeout 5
displaybootmenu Yes
Windows Boot Loader
-------------------
identifier {current}
device partition=C:
path \WINDOWS\system32\winload.efi
description Windows 10 home x64
locale it-IT
inherit {bootloadersettings}
recoverysequence {4a081ca8-71be-11e6-80cd-eca86b8ec766}
integrityservices Enable
recoveryenabled Yes
isolatedcontext Yes
allowedinmemorysettings 0x15000075
osdevice partition=C:
systemroot \WINDOWS
resumeobject {5d5a201e-d643-11e4-a71c-9001aae18364}
nx AlwaysOn
bootmenupolicy Legacy
quietboot No
I got this problem after I've accidentally removed all administrator accounts from netplwiz = control userpasswords2 (user accounts advanced menu?) some weeks/months ago.
I consider that a BUG in windows: we shouldn't be able to remove all administrator accounts!!!
I can't remember how I solved that problem; that's why I'm posting this: to remember how I did it, in the hope it could be useful for someone else.
Last edited: