Hi, I have attempted to patch a function into KernelBase.dll with no luck. winload.exe was patched by changing every mov whatever, 0xc0000428 to mov whatever, 0x0 so that the kernel can load. It seems there is some kind of discrepancy somewhere across the chain, as whenever kernelbase.dll is patched, no matter what patches are applied, the system will encounter an access violation late in the boot process.
It's kind of strange because I ran the system through WinDbg, and when it crashes, the stack trace mentions that it's crashing when trying to call SetSystemPowerState, which isn't even part of KernelBase.dll, so the functions I'm patching in shouldn't even matter.
This is why I think there may be some kind of extra security to prevent kernel patches in Windows 7, compared to Vista.
Does anyone have an idea on what could be happening here?