That is quite impressive. Congratulations with this achievement.
Can you give more details about it or share the ISO ?
It would be nice if you can share SYSTEM SOFTWARE and DEFAULT hive and
the filelist of boot.wim made after mount using
dir /b /on /s /a-d > wimfiles.txt
Then if hotplug.dll and DeviceEject.exe core
Import the following code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\00-SYSTEM]
"SymbolicLinkValue"=hex(6):5c,00,52,00,65,00,67,00,69,00,73,00,74,00,72,00,79,\
00,5c,00,4d,00,61,00,63,00,68,00,69,00,6e,00,65,00,5c,00,30,00,30,00,2d,00,\
53,00,59,00,53,00,54,00,45,00,4d,00
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001]
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control]
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbflags]
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbflags\04B46560000B]
"osvc"=hex:00,00
"SkipContainerIdQuery"=hex:01,00,00,00
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbflags\14DD10050000]
"osvc"=hex:00,00
"SkipContainerIdQuery"=hex:01,00,00,00
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbstor]
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbstor\054C00C1]
"DeviceHackFlags"=dword:20000000
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbstor\05AC12xx]
"DeviceHackFlags"=dword:00000020
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbstor\05AC13xx]
"DeviceHackFlags"=dword:00000020
[HKEY_LOCAL_MACHINE\00-SYSTEM\ControlSet001\Control\usbstor\05DCA431]
"DeviceHackFlags"=dword:00000010
See how?