- I have been dealing with a severe security issue concerning windows 8.1. Before I can load windows pe, using a certified oem copy of win8.1, I have some kind of configuration api file, redirect all 32bit api functions (which reports invalid file, directory timestamps) and appends the pe virtual X: drive with modified files, and rewrites the loaded registry with a top level RZ_NONE binary entry, where the normal (Default ) is located in each registry key. This results in having a hidden account named ~NONE that literally rewrites the entire installation and attaches itself inside of WMI, affecting secure uefi boot, directory file structures, kernel memory mapping, and pci tables that are reporting mapping tables using a #-1 bus ID! Upon the first boot, this none account has embedded itself into all kernel processes and winds up replacing the true win8.1 pkey cert with a modified one, so windows will believe the default kernel drivers are safe during bootup.
- Nothing I have tried, including custom wim images, or deleting these modified drivers has any effect, as all efforts wind up getting undone after a reboot. Dell and MSI both have replaced all hardware components inside both of my systems with no luck, and as a result, Dell fedex me a full licensed copy of Win8.1 using a retail license, to see if maybe microsoft can explain or resolve how all of my systems have been experiencing these issues, regardless of version or copy of windows I try to install? What is worse, is the fact not any of the best malware or antivirus scanners can detect any kind of infection, even when I can hold down a set of key combos, and get a full cmd prompt to load before I even have created my account in windows? As a prior MSDN subscriber, a few years ago, I tested every version of windows , including XP and 2003 server, and the same results occur. My Dell system is brand new and I have already had the hardware replaced twice, to no avail?
- Can someone from microsoft please help me try to resolve this issue as i would like to believe your product is more secure than allowing such a blatent bypass of all the built in security checks during uefi boot and kernel loadup? It has taken me quite a long time to verify these processes and the symptoms, and would like a resolution (other than buy/replace) new equipment from the experts, so I can get life back to normal? Please help, as already I have exhausted all other avenues and need a solution. Thanks.
↧
~NONE
↧